Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 18:50
Static task
static1
Behavioral task
behavioral1
Sample
85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe
Resource
win7-20240903-en
General
-
Target
85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe
-
Size
4.9MB
-
MD5
5be41c7ee0a83c4e3be16eec0584ebf0
-
SHA1
5dcd33a9b54d087cf612da502b9f3ce055aee5a0
-
SHA256
85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62c
-
SHA512
24f106fc859a9fc70c4715e27100dbb4b4eafbe5737d4e17ed51736aeee2e7a6c0dc4928b919104e7ea3150eca2aacd21257c547bdf111c2c872840b37621a85
-
SSDEEP
49152:jl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Signatures
-
Colibri family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2124 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2400 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4864 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4564 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3840 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3572 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3628 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 776 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4840 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4956 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4088 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3368 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4636 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3924 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4824 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1960 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 940 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4296 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4732 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3560 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5020 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4648 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4688 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5076 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5088 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4228 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 2420 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3172 2420 schtasks.exe 86 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe -
resource yara_rule behavioral2/memory/1776-2-0x000000001BF20000-0x000000001C04E000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 776 powershell.exe 2756 powershell.exe 3628 powershell.exe 3840 powershell.exe 4572 powershell.exe 5092 powershell.exe 4852 powershell.exe 1628 powershell.exe 3572 powershell.exe 1808 powershell.exe 4400 powershell.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dllhost.exe -
Executes dropped EXE 33 IoCs
pid Process 4588 tmpAC7C.tmp.exe 316 tmpAC7C.tmp.exe 3268 dllhost.exe 3640 tmpF2CC.tmp.exe 2756 tmpF2CC.tmp.exe 3700 dllhost.exe 3536 tmp28E0.tmp.exe 4376 tmp28E0.tmp.exe 4524 dllhost.exe 4552 tmp5AEC.tmp.exe 1004 tmp5AEC.tmp.exe 1996 dllhost.exe 3616 tmp8DC4.tmp.exe 4172 tmp8DC4.tmp.exe 2704 tmp8DC4.tmp.exe 3812 dllhost.exe 2076 tmpAC39.tmp.exe 2220 tmpAC39.tmp.exe 1200 tmpAC39.tmp.exe 4928 dllhost.exe 1416 tmpDE84.tmp.exe 3592 tmpDE84.tmp.exe 848 dllhost.exe 4504 dllhost.exe 392 tmp2EB7.tmp.exe 3032 tmp2EB7.tmp.exe 740 dllhost.exe 4432 tmp4C32.tmp.exe 2940 tmp4C32.tmp.exe 3488 tmp4C32.tmp.exe 2508 dllhost.exe 3000 tmp693F.tmp.exe 1724 tmp693F.tmp.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 4588 set thread context of 316 4588 tmpAC7C.tmp.exe 122 PID 3640 set thread context of 2756 3640 tmpF2CC.tmp.exe 168 PID 3536 set thread context of 4376 3536 tmp28E0.tmp.exe 182 PID 4552 set thread context of 1004 4552 tmp5AEC.tmp.exe 191 PID 4172 set thread context of 2704 4172 tmp8DC4.tmp.exe 202 PID 2220 set thread context of 1200 2220 tmpAC39.tmp.exe 211 PID 1416 set thread context of 3592 1416 tmpDE84.tmp.exe 220 PID 392 set thread context of 3032 392 tmp2EB7.tmp.exe 235 PID 2940 set thread context of 3488 2940 tmp4C32.tmp.exe 245 PID 3000 set thread context of 1724 3000 tmp693F.tmp.exe 254 -
Drops file in Program Files directory 24 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Photo Viewer\uk-UA\RCXCAA0.tmp 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File opened for modification C:\Program Files\Windows Photo Viewer\uk-UA\csrss.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\5940a34987c991 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File created C:\Program Files\Windows Portable Devices\RuntimeBroker.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File created C:\Program Files\Windows Photo Viewer\uk-UA\886983d96e3d3e 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RCXBACA.tmp 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\sppsvc.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\spoolsv.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RCXC88C.tmp 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\0a1fd5f707cd16 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File created C:\Program Files (x86)\WindowsPowerShell\spoolsv.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File created C:\Program Files\Windows Sidebar\Gadgets\5940a34987c991 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File created C:\Program Files\Windows Photo Viewer\uk-UA\csrss.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\dllhost.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File opened for modification C:\Program Files\Windows Portable Devices\RCXBCEE.tmp 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\dllhost.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File created C:\Program Files\Windows Portable Devices\9e8d7a4ca61bd9 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File created C:\Program Files (x86)\WindowsPowerShell\f3b6ecef712a24 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File created C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\sppsvc.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\RCXB8A6.tmp 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File opened for modification C:\Program Files\Windows Portable Devices\RuntimeBroker.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\RCXC5FB.tmp 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\PLA\Templates\6c5cb502ddf92b 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File opened for modification C:\Windows\PLA\Templates\RCXC155.tmp 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File opened for modification C:\Windows\PLA\Templates\85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe File created C:\Windows\PLA\Templates\85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpAC7C.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpF2CC.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp8DC4.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpAC39.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpAC39.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpDE84.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp2EB7.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp4C32.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp28E0.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp5AEC.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp8DC4.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp4C32.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp693F.tmp.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings dllhost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 940 schtasks.exe 5020 schtasks.exe 2184 schtasks.exe 3840 schtasks.exe 3572 schtasks.exe 2828 schtasks.exe 3044 schtasks.exe 4648 schtasks.exe 2312 schtasks.exe 2124 schtasks.exe 2712 schtasks.exe 4296 schtasks.exe 3560 schtasks.exe 4688 schtasks.exe 5088 schtasks.exe 776 schtasks.exe 1692 schtasks.exe 1960 schtasks.exe 4956 schtasks.exe 3924 schtasks.exe 2436 schtasks.exe 5076 schtasks.exe 3172 schtasks.exe 1492 schtasks.exe 4636 schtasks.exe 4840 schtasks.exe 4824 schtasks.exe 2400 schtasks.exe 3628 schtasks.exe 2328 schtasks.exe 4088 schtasks.exe 3368 schtasks.exe 4732 schtasks.exe 4228 schtasks.exe 4864 schtasks.exe 4564 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 1808 powershell.exe 1808 powershell.exe 3628 powershell.exe 3628 powershell.exe 3840 powershell.exe 3840 powershell.exe 4572 powershell.exe 4572 powershell.exe 5092 powershell.exe 5092 powershell.exe 2756 powershell.exe 2756 powershell.exe 3572 powershell.exe 3572 powershell.exe 776 powershell.exe 4852 powershell.exe 4852 powershell.exe 776 powershell.exe 4400 powershell.exe 4400 powershell.exe 1628 powershell.exe 1628 powershell.exe 776 powershell.exe 1628 powershell.exe 3628 powershell.exe 1808 powershell.exe 4400 powershell.exe 3572 powershell.exe 2756 powershell.exe 4852 powershell.exe 3840 powershell.exe 5092 powershell.exe 4572 powershell.exe 3268 dllhost.exe 3700 dllhost.exe 4524 dllhost.exe 1996 dllhost.exe 3812 dllhost.exe 4928 dllhost.exe 848 dllhost.exe 4504 dllhost.exe 740 dllhost.exe 2508 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe Token: SeDebugPrivilege 1808 powershell.exe Token: SeDebugPrivilege 3628 powershell.exe Token: SeDebugPrivilege 1628 powershell.exe Token: SeDebugPrivilege 4400 powershell.exe Token: SeDebugPrivilege 3572 powershell.exe Token: SeDebugPrivilege 3840 powershell.exe Token: SeDebugPrivilege 4572 powershell.exe Token: SeDebugPrivilege 5092 powershell.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 4852 powershell.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeDebugPrivilege 3268 dllhost.exe Token: SeDebugPrivilege 3700 dllhost.exe Token: SeDebugPrivilege 4524 dllhost.exe Token: SeDebugPrivilege 1996 dllhost.exe Token: SeDebugPrivilege 3812 dllhost.exe Token: SeDebugPrivilege 4928 dllhost.exe Token: SeDebugPrivilege 848 dllhost.exe Token: SeDebugPrivilege 4504 dllhost.exe Token: SeDebugPrivilege 740 dllhost.exe Token: SeDebugPrivilege 2508 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1776 wrote to memory of 4588 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 112 PID 1776 wrote to memory of 4588 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 112 PID 1776 wrote to memory of 4588 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 112 PID 4588 wrote to memory of 316 4588 tmpAC7C.tmp.exe 122 PID 4588 wrote to memory of 316 4588 tmpAC7C.tmp.exe 122 PID 4588 wrote to memory of 316 4588 tmpAC7C.tmp.exe 122 PID 4588 wrote to memory of 316 4588 tmpAC7C.tmp.exe 122 PID 4588 wrote to memory of 316 4588 tmpAC7C.tmp.exe 122 PID 4588 wrote to memory of 316 4588 tmpAC7C.tmp.exe 122 PID 4588 wrote to memory of 316 4588 tmpAC7C.tmp.exe 122 PID 1776 wrote to memory of 4572 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 133 PID 1776 wrote to memory of 4572 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 133 PID 1776 wrote to memory of 3840 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 134 PID 1776 wrote to memory of 3840 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 134 PID 1776 wrote to memory of 4400 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 135 PID 1776 wrote to memory of 4400 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 135 PID 1776 wrote to memory of 1808 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 136 PID 1776 wrote to memory of 1808 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 136 PID 1776 wrote to memory of 3572 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 137 PID 1776 wrote to memory of 3572 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 137 PID 1776 wrote to memory of 1628 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 138 PID 1776 wrote to memory of 1628 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 138 PID 1776 wrote to memory of 3628 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 139 PID 1776 wrote to memory of 3628 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 139 PID 1776 wrote to memory of 5092 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 140 PID 1776 wrote to memory of 5092 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 140 PID 1776 wrote to memory of 776 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 141 PID 1776 wrote to memory of 776 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 141 PID 1776 wrote to memory of 2756 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 146 PID 1776 wrote to memory of 2756 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 146 PID 1776 wrote to memory of 4852 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 151 PID 1776 wrote to memory of 4852 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 151 PID 1776 wrote to memory of 4732 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 155 PID 1776 wrote to memory of 4732 1776 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe 155 PID 4732 wrote to memory of 1092 4732 cmd.exe 157 PID 4732 wrote to memory of 1092 4732 cmd.exe 157 PID 4732 wrote to memory of 3268 4732 cmd.exe 162 PID 4732 wrote to memory of 3268 4732 cmd.exe 162 PID 3268 wrote to memory of 4992 3268 dllhost.exe 164 PID 3268 wrote to memory of 4992 3268 dllhost.exe 164 PID 3268 wrote to memory of 632 3268 dllhost.exe 165 PID 3268 wrote to memory of 632 3268 dllhost.exe 165 PID 3268 wrote to memory of 3640 3268 dllhost.exe 166 PID 3268 wrote to memory of 3640 3268 dllhost.exe 166 PID 3268 wrote to memory of 3640 3268 dllhost.exe 166 PID 3640 wrote to memory of 2756 3640 tmpF2CC.tmp.exe 168 PID 3640 wrote to memory of 2756 3640 tmpF2CC.tmp.exe 168 PID 3640 wrote to memory of 2756 3640 tmpF2CC.tmp.exe 168 PID 3640 wrote to memory of 2756 3640 tmpF2CC.tmp.exe 168 PID 3640 wrote to memory of 2756 3640 tmpF2CC.tmp.exe 168 PID 3640 wrote to memory of 2756 3640 tmpF2CC.tmp.exe 168 PID 3640 wrote to memory of 2756 3640 tmpF2CC.tmp.exe 168 PID 4992 wrote to memory of 3700 4992 WScript.exe 174 PID 4992 wrote to memory of 3700 4992 WScript.exe 174 PID 3700 wrote to memory of 3152 3700 dllhost.exe 177 PID 3700 wrote to memory of 3152 3700 dllhost.exe 177 PID 3700 wrote to memory of 3180 3700 dllhost.exe 178 PID 3700 wrote to memory of 3180 3700 dllhost.exe 178 PID 3700 wrote to memory of 3536 3700 dllhost.exe 180 PID 3700 wrote to memory of 3536 3700 dllhost.exe 180 PID 3700 wrote to memory of 3536 3700 dllhost.exe 180 PID 3536 wrote to memory of 4376 3536 tmp28E0.tmp.exe 182 PID 3536 wrote to memory of 4376 3536 tmp28E0.tmp.exe 182 PID 3536 wrote to memory of 4376 3536 tmp28E0.tmp.exe 182 -
System policy modification 1 TTPs 33 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe"C:\Users\Admin\AppData\Local\Temp\85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\tmpAC7C.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAC7C.tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\tmpAC7C.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAC7C.tmp.exe"3⤵
- Executes dropped EXE
PID:316
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5l00fIEm30.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1092
-
-
C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"3⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3268 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\69281d43-f00a-4d1a-bcd6-5273ee616ddd.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"5⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3700 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4f2b1f38-b9cc-42db-8aa7-6501030d949e.vbs"6⤵PID:3152
-
C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"7⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4524 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6040a8a7-0c39-4481-8081-cd5f3bc0700f.vbs"8⤵PID:1932
-
C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"9⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1996 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2d840a15-9ccb-4c57-ace6-6f3018980d34.vbs"10⤵PID:4400
-
C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"11⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3812 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7526c449-8b6a-49a4-a3c6-05e4ca6b56b2.vbs"12⤵PID:4032
-
C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"13⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4928 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8f3223f1-bd1f-4dd5-81e5-816f08ac6553.vbs"14⤵PID:5080
-
C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"15⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:848 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b86bd975-9b4e-4539-acb5-e858a2d14895.vbs"16⤵PID:3848
-
C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"17⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4504 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e0a7d85e-132e-491e-91e9-4d34db212d12.vbs"18⤵PID:2112
-
C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"19⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:740 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\06d5704f-1a05-4c34-98ec-fb63a5d2aede.vbs"20⤵PID:3428
-
C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe"21⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2508 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\39abe493-83ca-4e7f-a990-f2c5ff64e8f7.vbs"22⤵PID:1840
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\508b0b54-ce83-422a-964b-a6be83d3e4d0.vbs"22⤵PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\tmp693F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp693F.tmp.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\tmp693F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp693F.tmp.exe"23⤵
- Executes dropped EXE
PID:1724
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\076f2f3a-77d5-41ed-884e-99b1ac70fb4f.vbs"20⤵PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\tmp4C32.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp4C32.tmp.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\tmp4C32.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp4C32.tmp.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\tmp4C32.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp4C32.tmp.exe"22⤵
- Executes dropped EXE
PID:3488
-
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\aaa59b11-03d0-4239-9774-87390e397af4.vbs"18⤵PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\tmp2EB7.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp2EB7.tmp.exe"18⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:392 -
C:\Users\Admin\AppData\Local\Temp\tmp2EB7.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp2EB7.tmp.exe"19⤵
- Executes dropped EXE
PID:3032
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\640bf628-6103-4729-b811-b763f6fb7216.vbs"16⤵PID:2824
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cc48c5d4-faae-4af6-804a-6ba118366c28.vbs"14⤵PID:624
-
-
C:\Users\Admin\AppData\Local\Temp\tmpDE84.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpDE84.tmp.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\tmpDE84.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpDE84.tmp.exe"15⤵
- Executes dropped EXE
PID:3592
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\abcb1979-b07e-4824-9629-30e7f22b4483.vbs"12⤵PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\tmpAC39.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAC39.tmp.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\tmpAC39.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAC39.tmp.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\tmpAC39.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAC39.tmp.exe"14⤵
- Executes dropped EXE
PID:1200
-
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\13e4d676-3e88-42c8-b27c-67ed22316ead.vbs"10⤵PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\tmp8DC4.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp8DC4.tmp.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\tmp8DC4.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp8DC4.tmp.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\tmp8DC4.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp8DC4.tmp.exe"12⤵
- Executes dropped EXE
PID:2704
-
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\43c67c50-b625-44f1-9f39-5b1ef89b1d00.vbs"8⤵PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\tmp5AEC.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5AEC.tmp.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\tmp5AEC.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5AEC.tmp.exe"9⤵
- Executes dropped EXE
PID:1004
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ff630d2f-63da-4298-a2be-67cd75b546b5.vbs"6⤵PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\tmp28E0.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp28E0.tmp.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\tmp28E0.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp28E0.tmp.exe"7⤵
- Executes dropped EXE
PID:4376
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\68e68ed2-c0b6-44d0-93a7-2d6cfa648ef1.vbs"4⤵PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\tmpF2CC.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpF2CC.tmp.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\tmpF2CC.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpF2CC.tmp.exe"5⤵
- Executes dropped EXE
PID:2756
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Music\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Users\Default\Music\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Music\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\All Users\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN8" /sc MINUTE /mo 9 /tr "'C:\Windows\PLA\Templates\85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN" /sc ONLOGON /tr "'C:\Windows\PLA\Templates\85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN8" /sc MINUTE /mo 6 /tr "'C:\Windows\PLA\Templates\85f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62cN.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Microsoft\WDF\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\WDF\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Microsoft\WDF\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\WindowsPowerShell\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\WindowsPowerShell\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Sidebar\Gadgets\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Photo Viewer\uk-UA\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\uk-UA\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Photo Viewer\uk-UA\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3172
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD55be41c7ee0a83c4e3be16eec0584ebf0
SHA15dcd33a9b54d087cf612da502b9f3ce055aee5a0
SHA25685f00aaec0edca1b176e93ad542a4bc8c27b09ee77b883b31de64ca38fd2f62c
SHA51224f106fc859a9fc70c4715e27100dbb4b4eafbe5737d4e17ed51736aeee2e7a6c0dc4928b919104e7ea3150eca2aacd21257c547bdf111c2c872840b37621a85
-
Filesize
1KB
MD54a667f150a4d1d02f53a9f24d89d53d1
SHA1306e125c9edce66f28fdb63e6c4ca5c9ad6e8c97
SHA256414659decfd237dde09625a49811e03b5b30ee06ee2ee97ea8bcfac394d281fd
SHA5124edd8e73ce03488a6d92750a782cd4042fbb54a5b3f8d8ba3ea227fda0653c2cd84f0c5d64976c7cdc1f518a2fdc8ff10e2a015ec7acf3cd01b0d62bc98542d8
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
Filesize
944B
MD559d97011e091004eaffb9816aa0b9abd
SHA11602a56b01dd4b7c577ca27d3117e4bcc1aa657b
SHA25618f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d
SHA512d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6
-
Filesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
Filesize
728B
MD50ff7406cc2c6070808ab910ec738f229
SHA105f2af3a0b9a955f2625774f1459d4797b95f957
SHA256db47217bbb30888953fa49c357db30b0f55ae3e96b02d3aa7bad81b34fb9ff58
SHA512f4422030edcecf610421c2bcdbbb94367175a303ae062f7f474407c5ceabc94b89218b550c320da37d19aeb672d4fc33cb183ce0d64b9401b482e132a09d5d5c
-
Filesize
728B
MD59437667e953450aa897ac69baaf5f488
SHA16372f7b2801f496b9de90bd0767aea9aaf2fd142
SHA256bda6dd27a4d62765dbec1433b3ec772400d401c7f9b3809455618c9dbef62132
SHA51230c43c3fb3f478cb977daf66e1a20c417a288fc4fc107cfd675dd9b4aa35a5975fdff2eba8ccf3e83a9c6705589de5d1ee3cea5d2d27e564e6ec97eacb2c2a77
-
Filesize
217B
MD549668c461c05e6b3ef219741ff9c8e7c
SHA188c56dff69ac26caec41108e1d1bdbc7f76c18b0
SHA256dbf5ebfc31ff44833973a1e0a86707c16715a750b38508cc6f1f501db468dc2e
SHA5124990b3492aa382d94780e4b224653f16695feca1c29a00cdee19839557d644ef4e60fe35ef35720c87a73e554a087861191a3972faab7b3a1c34df58960cc25c
-
Filesize
728B
MD5289e44a4d7b509dc7429fb40d0c7fa40
SHA1baf614707cd862d6e351e354791eed37feac6f86
SHA25699b3667e7bec833ac3e80a0542584fd2a5b80304a3bdf7e7c0b21d10e2b4155d
SHA512049a3e3ec5e371602d3d0ca8a354b0f415fbd81dc215376c9c77b2aef899ce2514bcff3210aba17dcdfd7b6931eda519cd3b0f6506db6e62d7ee19c9213594f3
-
Filesize
504B
MD5521f75cc5b714668a3876ec2eb1100a0
SHA1623ad4cf56ac71cc415552d1050395fd20831619
SHA256d9882cbb6ccad1ca83c02206ca24e50546e9e174de7ce3ada8f1cfd5251076f8
SHA512728289e57f619fb465aa9d60779dd80813eddfd29db78b793af0ff4882e53588344d98436e055aba3adc20bba857180053c2d86e16a70fd4586265b4bf9a9e4b
-
Filesize
728B
MD5d8cd6d30e98a3558894c2aa54022b784
SHA16d8179e13aaccda325478c031ae2fd6049565356
SHA25614e58a58143abfc7ab4e562ab642c8b70cab19b85b998a0f428ff1f07a8d5f1d
SHA5121dd86c927e0bec493868c38d3122b6ace3c8ddd39454babdf7a46206c5f6355737926b665e15ca032ddb1b6a5ed9a1d1bce211ace06a94e69b342aede7e047ed
-
Filesize
728B
MD597688d325f882392777e5db31b7698c7
SHA178196dfc5ea9c4279b3a5a156933d778ca19610f
SHA256fd1a12b5977085f4492359671bdf82cd6837dc5c0959f0b8b842d26770149ef9
SHA512d8a6b508a2fae2494c3bceae0bf1fdd803a47fdf1297ba3c63da8a8ee14ba6b6d6eedf1094c7c83f225eab6156078c257da90725701f9c1362d38698f9fa0c4a
-
Filesize
728B
MD59ce0eb603330fe977cac2e55f0170ae4
SHA17ce849d8a5339c4c38d2bd94a573c718b7d1a361
SHA256a11ed38766befad339bd44855a241dc8a4a988de4d2cac4a1c4d8a00f581ae30
SHA512771cb884a3d8e368b0ba7409be3fd55f1cee4a92c4fc853603576d1e4844ed619ef75889e55be27a795af26225517e4bb5cd75f265e4c0bed341bc6a9a433002
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
727B
MD595fbec9e0a6f367646c51af4f7bfc1a8
SHA16433bad83fb9ae41a658f35afa8bcf4b4fca4098
SHA256242b13ae47b72d9bff62592a246a2c747ca06bde1320fcce7dd757c60e9b141c
SHA5120d81a2f0d5d652690f37d9e927fc0242276319c094efe4521dbe80904900b28bc73ecb1fe2e1b48ec66e2d24f85fb301ea5d46ebc180faadf6561415fd9d024d
-
Filesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
Filesize
4.9MB
MD5f7a894d810b824c2c05fcdd7e6f6571b
SHA18670728981d79b49fc5bcc575198a127804eddd7
SHA25603156df2b4284779dcc2011a9fe735f1ea654e56c02499daf089da24bf6cecb8
SHA512f305f69d65c17f518be7a065887a9d244e48e95a397af76d102a4c319b5b596b818d48e078c53ca4aa1d7e2a03d1bb04c6240e1b5bf9ca1180b4b4abe427b836