Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 09:00

General

  • Target

    5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508.exe

  • Size

    1.8MB

  • MD5

    ad09440875d20aadffdfdc8de043c448

  • SHA1

    fbfc7d94285b1da7e0799382a40352f827984771

  • SHA256

    5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508

  • SHA512

    e8d80aa2ec81b8b06b2a83e18674e19137b996f405dc4e6c93a3fcf76de0e949cbc333396a22141963043fd55ff9a8711eabd0963b933df58e4438f42706e8a3

  • SSDEEP

    24576:zyvTg4STbYSG65XZsTBsR36Y1864kHFLlb/sgaspAqsbTsIvVJUl52iFxA4Gbgz:W6hdR3KlyFLlbsrs6PbTJU24GbQ

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 15 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 15 IoCs
  • Runs ping.exe 1 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508.exe
    "C:\Users\Admin\AppData\Local\Temp\5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cprimsm1\cprimsm1.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB640.tmp" "c:\Windows\System32\CSC61756816FCD84101A84172A66C4BAE5.TMP"
        3⤵
          PID:3348
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\l2grNi8PIv.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:984
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:3764
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:1556
          • C:\Users\Public\fontdrvhost.exe
            "C:\Users\Public\fontdrvhost.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Modifies registry class
            PID:4900
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IeLvrzYA0a.bat"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4128
              • C:\Windows\system32\chcp.com
                chcp 65001
                5⤵
                  PID:2208
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  5⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:2428
                • C:\Users\Public\fontdrvhost.exe
                  "C:\Users\Public\fontdrvhost.exe"
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2132
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jic4eklKP7.bat"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3864
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      7⤵
                        PID:4980
                      • C:\Windows\system32\w32tm.exe
                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                        7⤵
                          PID:4092
                        • C:\Users\Public\fontdrvhost.exe
                          "C:\Users\Public\fontdrvhost.exe"
                          7⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4860
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\EHU1Lrqt50.bat"
                            8⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1852
                            • C:\Windows\system32\chcp.com
                              chcp 65001
                              9⤵
                                PID:3788
                              • C:\Windows\system32\PING.EXE
                                ping -n 10 localhost
                                9⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:1648
                              • C:\Users\Public\fontdrvhost.exe
                                "C:\Users\Public\fontdrvhost.exe"
                                9⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:4896
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\B8RGJU8TMM.bat"
                                  10⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:3344
                                  • C:\Windows\system32\chcp.com
                                    chcp 65001
                                    11⤵
                                      PID:984
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      11⤵
                                        PID:1400
                                      • C:\Users\Public\fontdrvhost.exe
                                        "C:\Users\Public\fontdrvhost.exe"
                                        11⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:2772
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\z03YznJ6kZ.bat"
                                          12⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:3528
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            13⤵
                                              PID:1336
                                            • C:\Windows\system32\PING.EXE
                                              ping -n 10 localhost
                                              13⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              • Runs ping.exe
                                              PID:1396
                                            • C:\Users\Public\fontdrvhost.exe
                                              "C:\Users\Public\fontdrvhost.exe"
                                              13⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Modifies registry class
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of WriteProcessMemory
                                              PID:4128
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\KtA3LkY0CV.bat"
                                                14⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:1300
                                                • C:\Windows\system32\chcp.com
                                                  chcp 65001
                                                  15⤵
                                                    PID:4980
                                                  • C:\Windows\system32\w32tm.exe
                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                    15⤵
                                                      PID:4188
                                                    • C:\Users\Public\fontdrvhost.exe
                                                      "C:\Users\Public\fontdrvhost.exe"
                                                      15⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:1700
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bytHbUMnZy.bat"
                                                        16⤵
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:4808
                                                        • C:\Windows\system32\chcp.com
                                                          chcp 65001
                                                          17⤵
                                                            PID:4976
                                                          • C:\Windows\system32\w32tm.exe
                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                            17⤵
                                                              PID:2580
                                                            • C:\Users\Public\fontdrvhost.exe
                                                              "C:\Users\Public\fontdrvhost.exe"
                                                              17⤵
                                                              • Checks computer location settings
                                                              • Executes dropped EXE
                                                              • Modifies registry class
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1052
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vcBeTfbqpz.bat"
                                                                18⤵
                                                                  PID:1456
                                                                  • C:\Windows\system32\chcp.com
                                                                    chcp 65001
                                                                    19⤵
                                                                      PID:1852
                                                                    • C:\Windows\system32\w32tm.exe
                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                      19⤵
                                                                        PID:3384
                                                                      • C:\Users\Public\fontdrvhost.exe
                                                                        "C:\Users\Public\fontdrvhost.exe"
                                                                        19⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        • Modifies registry class
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1972
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tOMWzubzd4.bat"
                                                                          20⤵
                                                                            PID:4836
                                                                            • C:\Windows\system32\chcp.com
                                                                              chcp 65001
                                                                              21⤵
                                                                                PID:1400
                                                                              • C:\Windows\system32\w32tm.exe
                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                21⤵
                                                                                  PID:4284
                                                                                • C:\Users\Public\fontdrvhost.exe
                                                                                  "C:\Users\Public\fontdrvhost.exe"
                                                                                  21⤵
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:2056
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\KtA3LkY0CV.bat"
                                                                                    22⤵
                                                                                      PID:4376
                                                                                      • C:\Windows\system32\chcp.com
                                                                                        chcp 65001
                                                                                        23⤵
                                                                                          PID:264
                                                                                        • C:\Windows\system32\w32tm.exe
                                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                          23⤵
                                                                                            PID:4616
                                                                                          • C:\Users\Public\fontdrvhost.exe
                                                                                            "C:\Users\Public\fontdrvhost.exe"
                                                                                            23⤵
                                                                                            • Checks computer location settings
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:4384
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5xIcrgADPl.bat"
                                                                                              24⤵
                                                                                                PID:4000
                                                                                                • C:\Windows\system32\chcp.com
                                                                                                  chcp 65001
                                                                                                  25⤵
                                                                                                    PID:4128
                                                                                                  • C:\Windows\system32\w32tm.exe
                                                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                    25⤵
                                                                                                      PID:4980
                                                                                                    • C:\Users\Public\fontdrvhost.exe
                                                                                                      "C:\Users\Public\fontdrvhost.exe"
                                                                                                      25⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:4840
                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\p1UdTmuiiU.bat"
                                                                                                        26⤵
                                                                                                          PID:1764
                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                            chcp 65001
                                                                                                            27⤵
                                                                                                              PID:4176
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping -n 10 localhost
                                                                                                              27⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:3040
                                                                                                            • C:\Users\Public\fontdrvhost.exe
                                                                                                              "C:\Users\Public\fontdrvhost.exe"
                                                                                                              27⤵
                                                                                                              • Checks computer location settings
                                                                                                              • Executes dropped EXE
                                                                                                              • Modifies registry class
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:4460
                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Auc8oj9cAR.bat"
                                                                                                                28⤵
                                                                                                                  PID:220
                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                    chcp 65001
                                                                                                                    29⤵
                                                                                                                      PID:4496
                                                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                      29⤵
                                                                                                                        PID:1488
                                                                                                                      • C:\Users\Public\fontdrvhost.exe
                                                                                                                        "C:\Users\Public\fontdrvhost.exe"
                                                                                                                        29⤵
                                                                                                                        • Checks computer location settings
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:1560
                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5xIcrgADPl.bat"
                                                                                                                          30⤵
                                                                                                                            PID:1056
                                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                                              chcp 65001
                                                                                                                              31⤵
                                                                                                                                PID:4580
                                                                                                                              • C:\Windows\system32\w32tm.exe
                                                                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                                31⤵
                                                                                                                                  PID:2236
                                                                                                                                • C:\Users\Public\fontdrvhost.exe
                                                                                                                                  "C:\Users\Public\fontdrvhost.exe"
                                                                                                                                  31⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:1456
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e45487935085" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:224
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3064
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e45487935085" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Google\5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3360
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Start Menu\csrss.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1920
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\Start Menu\csrss.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2472
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Start Menu\csrss.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3564
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Users\Public\fontdrvhost.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2464
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Public\fontdrvhost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1956
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Users\Public\fontdrvhost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3308
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\spoolsv.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1604
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\spoolsv.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2612
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\spoolsv.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1448
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1700
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3296
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:4440
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e45487935085" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\Temp\5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3860
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:4060
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e45487935085" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\Temp\5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3256

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Program Files (x86)\Google\5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508.exe

                                                                      Filesize

                                                                      1.8MB

                                                                      MD5

                                                                      ad09440875d20aadffdfdc8de043c448

                                                                      SHA1

                                                                      fbfc7d94285b1da7e0799382a40352f827984771

                                                                      SHA256

                                                                      5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508

                                                                      SHA512

                                                                      e8d80aa2ec81b8b06b2a83e18674e19137b996f405dc4e6c93a3fcf76de0e949cbc333396a22141963043fd55ff9a8711eabd0963b933df58e4438f42706e8a3

                                                                    • C:\Users\Admin\AppData\Local\Temp\5xIcrgADPl.bat

                                                                      Filesize

                                                                      207B

                                                                      MD5

                                                                      53e6668019a29cc225a576c0ab108825

                                                                      SHA1

                                                                      145490764094b103b902e7555ffafedb471321ef

                                                                      SHA256

                                                                      da52c080610f7a5c5a5b0fb76f9494a6f938e8ff709d3d652a5c755f2d56fff7

                                                                      SHA512

                                                                      149de41c1c8e171f9b50d61cfe20bc692a514f419a69d7634da2838c95da222ba539c455f9a5091165acce29aab4c3997be69af24e97037b476950fb32eab973

                                                                    • C:\Users\Admin\AppData\Local\Temp\Auc8oj9cAR.bat

                                                                      Filesize

                                                                      207B

                                                                      MD5

                                                                      620fbe37f2f5addbdb019548a7b2123f

                                                                      SHA1

                                                                      4033073d70f89a6c36eaf7410b66052f484f883f

                                                                      SHA256

                                                                      9ec469589868e9be2d8c36597b235533a825f63f9877c317857efcb952a142aa

                                                                      SHA512

                                                                      4c4224b920b9181954692cb89a293ddb0ddb9c04534303953d44c54d560eb5f6a7ec115b5495488d2fca1bf1aca31b38a2ed9a6653ed817977ef2c66ed994767

                                                                    • C:\Users\Admin\AppData\Local\Temp\B8RGJU8TMM.bat

                                                                      Filesize

                                                                      207B

                                                                      MD5

                                                                      ac04835436f835d0805fe39ee9a3a414

                                                                      SHA1

                                                                      d0252e50e3301529aa6c2fb7e8913b8f5e3b9a2e

                                                                      SHA256

                                                                      9b9877fed68f40db6f33fd946ebb346d9acd224289b1ffdd794d6c95d08aa292

                                                                      SHA512

                                                                      ad14b5f1054a16164fd01aa4658409cd990eab59422340019353665e3815c090b13803f561baa06a6ff68bdd0adb7719ce54a7ee15ddb06c29c1d5476a2c6f6f

                                                                    • C:\Users\Admin\AppData\Local\Temp\EHU1Lrqt50.bat

                                                                      Filesize

                                                                      159B

                                                                      MD5

                                                                      28e6a5de8c2d6bb9d3154ee5e1839b08

                                                                      SHA1

                                                                      c815f03820d599ac19041fb5b21e0890c75b90e9

                                                                      SHA256

                                                                      4b3809f9e00324a3e6140418ef754d191a2003473822fe76b4cf83230ffca51f

                                                                      SHA512

                                                                      ba82a8b8aed9bbe9cc610483248a737a245870fb3990eda8bf7bc208e87d17aa630d2eb5fba8c72ea2fab4d54c32c86b8c55e10b975808aca85ea63f2adcdd27

                                                                    • C:\Users\Admin\AppData\Local\Temp\KtA3LkY0CV.bat

                                                                      Filesize

                                                                      207B

                                                                      MD5

                                                                      cda17addae6f62fb2cf4695c75e3afb4

                                                                      SHA1

                                                                      4dacad50ef498d6644343c005e5677e43eb7ab70

                                                                      SHA256

                                                                      1c64e35568e5b962f3ad8d6861f512450c6a096b2c8670679d0b84faaf344fa1

                                                                      SHA512

                                                                      868aecf58c647ef5047269350eac71bc7c53373b8169e6b126757ec6a6eadf38bd7f4dfab4a8f8694357d326d01ccd93d1c4869f76bf6b21a025575905adc8c0

                                                                    • C:\Users\Admin\AppData\Local\Temp\RESB640.tmp

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      7d2043acd8948b3dca94e45aa1ee3458

                                                                      SHA1

                                                                      019c7ae128383cc2a8ffcc69c655bcdbaf487649

                                                                      SHA256

                                                                      a066d1f405b1e6468227f073a5eb9ef2c0b84bc7dca8151e6d4856d5677c9105

                                                                      SHA512

                                                                      44967b6214c9802387958078c884af180c9bed40e98503d70ab7cab35471a29c83ba054e9b40d5d33b3e06abca74aa5dcadc0eacb4e9a2a70feeb77d23a651d9

                                                                    • C:\Users\Admin\AppData\Local\Temp\bytHbUMnZy.bat

                                                                      Filesize

                                                                      207B

                                                                      MD5

                                                                      8fafcd9f2138526386d61f71e5412c29

                                                                      SHA1

                                                                      06450bae84df1d351b1957887a31df54982b999d

                                                                      SHA256

                                                                      364a2b98c10d75470fdcd3a6b87c6b82f305f68ced1b490a677e899c09169bf7

                                                                      SHA512

                                                                      328463fb7574d8640611c751dd1dc4fd75f610c71aa7b4782b7c8d4318d6ce2319b8b59aaed887306c2536cd02adbcb9cbc2cbb9211aa6aec442ae25bbe398c0

                                                                    • C:\Users\Admin\AppData\Local\Temp\jic4eklKP7.bat

                                                                      Filesize

                                                                      207B

                                                                      MD5

                                                                      7e16cb4e9a45f52c1ea9681a1fb7fe0f

                                                                      SHA1

                                                                      a8312c33b876de2662fc8687f94a20c16581edf8

                                                                      SHA256

                                                                      40a138ef067affff8295bfe9229f17add090a81758f26b0ad227977de31a94ba

                                                                      SHA512

                                                                      9ee24aeabdd4ffeca3d74f487446850916ec9568b822dadf42ee188e4c77b04a88a7d9328b07b2d8778e0038131f1ce8640fe06bee3ba050970342d8740f9cb9

                                                                    • C:\Users\Admin\AppData\Local\Temp\l2grNi8PIv.bat

                                                                      Filesize

                                                                      159B

                                                                      MD5

                                                                      e18e8c704ab5a0a27b85b0a9dc789fb0

                                                                      SHA1

                                                                      c4af7f7e1322bbf736a485d4146a92f91d56a789

                                                                      SHA256

                                                                      905cf715a2a67ea82ebdeed4994f4d68b50ba2a6509507d6f81e286fb7baf7a3

                                                                      SHA512

                                                                      54e25798733178b6ce6d811b86388cffd2cabe0dc6c92c1e8dbe337e0b801fd48316e71e91ce9ca12d4f9d94e59e1cf41dade6b70a32a7e174ee194a8dbe5891

                                                                    • C:\Users\Admin\AppData\Local\Temp\p1UdTmuiiU.bat

                                                                      Filesize

                                                                      159B

                                                                      MD5

                                                                      b2db25f152e5c67e3f595a6571ebd0d0

                                                                      SHA1

                                                                      4cdd1fc97e50ab2eb22b8556226b4980f50c2165

                                                                      SHA256

                                                                      4d8a2a399e47f98646e6486d18d7d65682a327f83b2d9b92b60985440d8c1121

                                                                      SHA512

                                                                      268a23636eeb955819fe46715da99b3add44be20843b2ab2cc55d1ec7ea05246e8cf8924bc3fd4a6355f4a4ce643d2dbb52ea785ebc8c0724cc7b873511da590

                                                                    • C:\Users\Admin\AppData\Local\Temp\tOMWzubzd4.bat

                                                                      Filesize

                                                                      207B

                                                                      MD5

                                                                      fd7acc0ef0452c673b0c39324d356c60

                                                                      SHA1

                                                                      2cd6f9a3b9444427d4f5bb71d2475b6232afbf0d

                                                                      SHA256

                                                                      59c412131946b35d0fee24e81dd6741ccf977588446e5788ebdd43aa67a93535

                                                                      SHA512

                                                                      bbcfb632de73f6df374680e3e70d2ec89c5041c04067a6a149cd44813b0dde79772557a395cdba0e851bcb744500356e332f3fe1693291ea8ed2025d2fe20dd3

                                                                    • C:\Users\Admin\AppData\Local\Temp\vcBeTfbqpz.bat

                                                                      Filesize

                                                                      207B

                                                                      MD5

                                                                      0ee27588063920bc3d1031ca1bf6d610

                                                                      SHA1

                                                                      2b2a6cd0762a82ea0451264c217022d4429aa1af

                                                                      SHA256

                                                                      c212e2576d2a7bcaa4b7fadebd1b22ab496c129f21cdf9a2246106a09ded276c

                                                                      SHA512

                                                                      6b0380953bbb69575322f028194779cbcbd0654d00e1d627c12c8fffd427cefd380182922cb00c09ba7bf035d8799ee0eb8926e3c755739eda96b25a48d53fe1

                                                                    • C:\Users\Admin\AppData\Local\Temp\z03YznJ6kZ.bat

                                                                      Filesize

                                                                      159B

                                                                      MD5

                                                                      e58b4435bea0f698110208432ff52885

                                                                      SHA1

                                                                      8691bed30534cabb17b5a9a4b183b1b06ff00a25

                                                                      SHA256

                                                                      3c380615a4631d4e47912da363a6bb826bcdd00892cf55cf260571a2f1cb2018

                                                                      SHA512

                                                                      457734da4560085835e000f34e7296d8a007f3dbb1212359ad68d59d6a70d0507bd1db0622f93047e55f23a4650f49549ace71699c29b998347fc78a011534da

                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\cprimsm1\cprimsm1.0.cs

                                                                      Filesize

                                                                      430B

                                                                      MD5

                                                                      286f58cd75fb730c241a1bb34d4ebe7e

                                                                      SHA1

                                                                      681f46c15bd3300f58fba7fed2614e8f81c1eeb0

                                                                      SHA256

                                                                      f5750bbddb3fe710c1b0ef82c0132fe0a94f75e7c5b7551ddf536d89864c99c3

                                                                      SHA512

                                                                      a0a3c35e8bf83b53eae915baf7bac7d3386475b06f3517a90f8c2d7548b8019d49f7c1a88fa620c476eb159b865408a67e4eae7ee5c449db6e769e69b44e8256

                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\cprimsm1\cprimsm1.cmdline

                                                                      Filesize

                                                                      235B

                                                                      MD5

                                                                      331f8324fdf5e1bd2e6638a35be66def

                                                                      SHA1

                                                                      44fdae581b2c4295fcf0de6f9059458b4d6b44e5

                                                                      SHA256

                                                                      e7571bea1c5de83289f8522eb608735bbfb16686c6e83dcb3eda11e85c4e3556

                                                                      SHA512

                                                                      0031b9474b53d8a31313f17be7ce6bd0c607ab1dfb8a17f4e1a3a7722938284c9296ef3cbdd0004c79d23be569c16d644a5f06eda85ffae808327ae51e43157d

                                                                    • \??\c:\Windows\System32\CSC61756816FCD84101A84172A66C4BAE5.TMP

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      7bbfaf1199741b237d2493615c95c6d7

                                                                      SHA1

                                                                      86d466217c4dc1e0808f83ceda8f4b4df948b5dc

                                                                      SHA256

                                                                      e20e4619dbc932a216fd93f86fe0af2e915f4c2ba6177fc3581da59885094476

                                                                      SHA512

                                                                      2eda9bf71dc4a4583b7b8e9a6aab0f91d98cca68ee4309df1a4d26541917678da09a15d712397ae4b95fe95b65c8aa6eeab94d7620a5546b3df6c00306ef4a5c

                                                                    • memory/4200-11-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4200-30-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4200-23-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4200-15-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4200-48-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4200-17-0x0000000000FD0000-0x0000000000FDC000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/4200-10-0x00000000028B0000-0x00000000028CC000-memory.dmp

                                                                      Filesize

                                                                      112KB

                                                                    • memory/4200-14-0x00000000028D0000-0x00000000028E8000-memory.dmp

                                                                      Filesize

                                                                      96KB

                                                                    • memory/4200-12-0x000000001B670000-0x000000001B6C0000-memory.dmp

                                                                      Filesize

                                                                      320KB

                                                                    • memory/4200-0-0x00007FF83CB53000-0x00007FF83CB55000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4200-8-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4200-7-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4200-6-0x0000000000F80000-0x0000000000F8E000-memory.dmp

                                                                      Filesize

                                                                      56KB

                                                                    • memory/4200-4-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4200-3-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4200-2-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4200-1-0x0000000000490000-0x000000000066A000-memory.dmp

                                                                      Filesize

                                                                      1.9MB