Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-uk -
resource tags
arch:x64arch:x86image:win11-20241007-uklocale:uk-uaos:windows11-21h2-x64systemwindows -
submitted
20-11-2024 18:58
General
-
Target
fatality(ez cracked).exe
-
Size
2.6MB
-
MD5
56622002384049e2d2a6b70511c5e614
-
SHA1
8b1edded9e65ea88c555cd3d17a297f78e8862c4
-
SHA256
7fd1dd60ec001addf3f66143d962dc393c68c00761257adbdc95bced6f4d684c
-
SHA512
f4aa66667b578c510b99b6a464976fa6d0655f89165554f7fee4dfa4d03874007319ceb57316c73ac46c5d07961a9c198dd5866bfb6956d92895e91b54a68c7d
-
SSDEEP
49152:JbA3TLHcQogOnBJi/2Kw+gkKh2KXQ10fCB4h70ZE5v91aLAsOfM+JJ5tRTJUHt:JbK0gOn6/2Kw+gkKgmQ17Ba0Z8v91aLz
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3948 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3700 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3648 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4388 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 968 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3396 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2824 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3784 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 928 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1336 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 432 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4348 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1728 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1852 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 488 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4880 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3460 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1036 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4788 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3836 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3040 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 676 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4288 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5064 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1268 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3244 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4688 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4536 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4568 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1388 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4276 2100 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1464 2100 schtasks.exe 90 -
resource yara_rule behavioral1/files/0x001900000002ab9d-20.dat dcrat behavioral1/memory/2608-22-0x0000000000F50000-0x000000000118A000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 2608 BrokerMonitor.exe 3424 BrokerMonitor.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsPowerShell\Configuration\sppsvc.exe BrokerMonitor.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\886983d96e3d3e BrokerMonitor.exe File created C:\Program Files\ModifiableWindowsApps\RuntimeBroker.exe BrokerMonitor.exe File created C:\Program Files (x86)\MSBuild\Microsoft\BrokerMonitor.exe BrokerMonitor.exe File created C:\Program Files\WindowsPowerShell\Modules\5940a34987c991 BrokerMonitor.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\csrss.exe BrokerMonitor.exe File created C:\Program Files (x86)\MSBuild\Microsoft\795b0800c2c468 BrokerMonitor.exe File created C:\Program Files\WindowsPowerShell\Configuration\sppsvc.exe BrokerMonitor.exe File created C:\Program Files\WindowsPowerShell\Configuration\0a1fd5f707cd16 BrokerMonitor.exe File created C:\Program Files (x86)\Microsoft.NET\Idle.exe BrokerMonitor.exe File created C:\Program Files (x86)\Microsoft.NET\6ccacd8608530f BrokerMonitor.exe File created C:\Program Files\WindowsPowerShell\Modules\dllhost.exe BrokerMonitor.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\GameBarPresenceWriter\27d1bcfc3c54e0 BrokerMonitor.exe File created C:\Windows\bcastdvr\RuntimeBroker.exe BrokerMonitor.exe File created C:\Windows\bcastdvr\9e8d7a4ca61bd9 BrokerMonitor.exe File created C:\Windows\GameBarPresenceWriter\System.exe BrokerMonitor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fatality(ez cracked).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings fatality(ez cracked).exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3040 schtasks.exe 676 schtasks.exe 4536 schtasks.exe 1388 schtasks.exe 2824 schtasks.exe 2992 schtasks.exe 488 schtasks.exe 4788 schtasks.exe 1464 schtasks.exe 928 schtasks.exe 1336 schtasks.exe 4568 schtasks.exe 1852 schtasks.exe 3836 schtasks.exe 1636 schtasks.exe 4688 schtasks.exe 1940 schtasks.exe 4388 schtasks.exe 432 schtasks.exe 3460 schtasks.exe 5064 schtasks.exe 3948 schtasks.exe 3648 schtasks.exe 4288 schtasks.exe 968 schtasks.exe 3396 schtasks.exe 4880 schtasks.exe 1036 schtasks.exe 3784 schtasks.exe 2884 schtasks.exe 3244 schtasks.exe 4276 schtasks.exe 3700 schtasks.exe 4348 schtasks.exe 1728 schtasks.exe 1268 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2608 BrokerMonitor.exe 2608 BrokerMonitor.exe 2608 BrokerMonitor.exe 2608 BrokerMonitor.exe 2608 BrokerMonitor.exe 2608 BrokerMonitor.exe 2608 BrokerMonitor.exe 3424 BrokerMonitor.exe 3424 BrokerMonitor.exe 3424 BrokerMonitor.exe 3424 BrokerMonitor.exe 3424 BrokerMonitor.exe 3424 BrokerMonitor.exe 3424 BrokerMonitor.exe 3424 BrokerMonitor.exe 3424 BrokerMonitor.exe 3424 BrokerMonitor.exe 3424 BrokerMonitor.exe 3424 BrokerMonitor.exe 3424 BrokerMonitor.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3424 BrokerMonitor.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2608 BrokerMonitor.exe Token: SeDebugPrivilege 3424 BrokerMonitor.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3120 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2956 2252 fatality(ez cracked).exe 79 PID 2252 wrote to memory of 2956 2252 fatality(ez cracked).exe 79 PID 2252 wrote to memory of 2956 2252 fatality(ez cracked).exe 79 PID 2252 wrote to memory of 3880 2252 fatality(ez cracked).exe 80 PID 2252 wrote to memory of 3880 2252 fatality(ez cracked).exe 80 PID 2252 wrote to memory of 3880 2252 fatality(ez cracked).exe 80 PID 2252 wrote to memory of 5080 2252 fatality(ez cracked).exe 81 PID 2252 wrote to memory of 5080 2252 fatality(ez cracked).exe 81 PID 2252 wrote to memory of 5080 2252 fatality(ez cracked).exe 81 PID 5080 wrote to memory of 4600 5080 cmd.exe 85 PID 5080 wrote to memory of 4600 5080 cmd.exe 85 PID 5080 wrote to memory of 4600 5080 cmd.exe 85 PID 2956 wrote to memory of 3484 2956 WScript.exe 87 PID 2956 wrote to memory of 3484 2956 WScript.exe 87 PID 2956 wrote to memory of 3484 2956 WScript.exe 87 PID 3484 wrote to memory of 2608 3484 cmd.exe 89 PID 3484 wrote to memory of 2608 3484 cmd.exe 89 PID 2608 wrote to memory of 3424 2608 BrokerMonitor.exe 127 PID 2608 wrote to memory of 3424 2608 BrokerMonitor.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fatality(ez cracked).exe"C:\Users\Admin\AppData\Local\Temp\fatality(ez cracked).exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MsintoNet\nHRdjr.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\MsintoNet\mIOQQzlA02ZU24pF0jGuEQEycJkgNN.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\MsintoNet\BrokerMonitor.exe"C:\MsintoNet\BrokerMonitor.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\MSBuild\Microsoft\BrokerMonitor.exe"C:\Program Files (x86)\MSBuild\Microsoft\BrokerMonitor.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MsintoNet\file.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:3880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\MsintoNet\nrQ99sdYMIej7R1eVOn.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "echo Cheat broken. Reinstall"3⤵
- System Location Discovery: System Language Discovery
PID:4600
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files\WindowsPowerShell\Configuration\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Configuration\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Program Files\WindowsPowerShell\Configuration\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft.NET\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files\WindowsPowerShell\Modules\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Modules\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files\WindowsPowerShell\Modules\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchHostS" /sc MINUTE /mo 9 /tr "'C:\MsintoNet\SearchHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchHost" /sc ONLOGON /tr "'C:\MsintoNet\SearchHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchHostS" /sc MINUTE /mo 11 /tr "'C:\MsintoNet\SearchHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrokerMonitorB" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\BrokerMonitor.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrokerMonitor" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\BrokerMonitor.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrokerMonitorB" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\BrokerMonitor.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Windows\GameBarPresenceWriter\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\GameBarPresenceWriter\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Windows\GameBarPresenceWriter\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Windows\bcastdvr\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\bcastdvr\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Windows\bcastdvr\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Downloads\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\Public\Downloads\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Users\Public\Downloads\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Downloads\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Public\Downloads\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Downloads\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1464
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3120
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD55dad48abf6a08af9901b21354338aa30
SHA18e0b275979fcb32c5bae5fa477a377d107d3667f
SHA2566baabc2e0b5cd8b060225d61eb62cad086fafa50a6137cee4329ebf6546ec3bd
SHA512e7bb25f4c7b2c2586138af9d732d8cfebe2eb9f8c07c3dab8aad464f9967f06b7e36fbe4db65659a506783904056fc8424121a3c14b7189994d65da57c9270d8
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
32B
MD5af2588f35c830f0576b666f81cb23a03
SHA14492c3dc6ce0cac0ff0eff2312a9a57919e39041
SHA2565aa41b30140a305e598523ccd646b3fa92bd1c3fdb61797e2d64fa0dde191b63
SHA5127d57468b8f2965a1ac184cbf91cff5a664e2ce9a1679a9c0af7f69b36a547509c35f15c43c9d1ab0f0e568ae53c04d0e4edca2972b9a7a2edbac191d330e7e7f
-
Filesize
217B
MD508b7454316740f2927ea707a5ba3c79c
SHA1c9f00505ba4cbd8b1a330d2e67ca76c14b73ce4c
SHA2563f8d0e7e8c3822b1c4867d44543ed1d03e1f7c3c6d1a481524cced05900fd5ea
SHA512c303c7a1069b88315a0645e88e6668b8fd6e8fa80550bd98389ceed70fb872cc974db15315764eb8bbe16c7f0eb2cd75c28c3838c2211f253d65f63bd54c6628
-
Filesize
41B
MD597b3f1e56dad34be4cb84e244cfd4a4e
SHA1818bdc90e169c9bbc4f4562bd0969062b026ecb7
SHA256f226101fdf7399badc937d237887e4257d59277ac33de6dff6704866889ee2c7
SHA512ce79928b03564978bd53201c63f1fb2f1ac7d3a3794705fbf6a9b790f8339d875c37890052639bbd84261b545eb8ca5d7f89345f4377eb9137283aa3884ec97e
-
Filesize
1KB
MD54a154b138b22d8614bea6d4aa8bffecf
SHA1e234d740d83d68c2233e8bf3ffd65406d5ca9563
SHA2560c84f439b774b18f2f98ff2bd65b31a7540a064ec20aed0b5cd5fdd7546d56f6
SHA512c3f7dabc72ddc377d50843b5e3a2bdc1600cee7d5dcdc52b7db9c675fbc5cb510be01ffe911462fd4e5af95737108ae1b19d006c00be5217f489c3772b7a68ec
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD57163cba9f3735b65bb0afa79db7c7a8f
SHA191a4ba757cf8c5a4ba1f3efdcf7f6a55f30b0927
SHA25637bb3137b0b2f73acc3c81632a4145784cd8281d49791d7fbbf9b0b693c33835
SHA512fd6797590f7140c37571e9dc382f1f127d0a95ef60e7a5409c25bc3943ad235c953040fe60a4bad43850631b921ad231a198b25e60ef70d41e67ded725142d62
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5453c6a256d81080d794fc5e46c9336bb
SHA1f7310cc267996437fbfdb1f5b57e9d4cd218eeed
SHA2566a9c1168a2e3c696f2cdb08fd1ae8ee6c3ef0b916b198c6d762483336c10a8d7
SHA512f3c84a52ad9e800e7cd02e50d1dbd30c93d3a8d777df6543e6cd9434aae93d2b1ec6558a3a22e7e0cb2cb06c6c8cea5fdceb3938374418dfa2172e765ff654ef