Analysis
-
max time kernel
125s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 02:14
Behavioral task
behavioral1
Sample
4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe
Resource
win10v2004-20241007-en
General
-
Target
4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe
-
Size
829KB
-
MD5
a054982f7e12c1f491eccd25d9c1b5d7
-
SHA1
b3c78b1c7c8a95486db06e39f56910d0f3e90996
-
SHA256
4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408
-
SHA512
d57be5af22f21e7c20d330f5714ddcf1936152e3d9bd2254c1a2c83f420bfe183ae204c871b1ce2d8f5361a1661afbe39a9b5bec12fb00195a8c0b967977a925
-
SSDEEP
24576:b3eblFYt2e9esxtDyVjD7D1NauFd3YP+ow7:b2rejxtDydhc
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3156 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3984 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2264 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3744 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 400 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2280 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3648 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2368 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2244 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2588 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2356 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2412 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4940 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4912 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 380 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5068 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3296 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3524 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4708 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 856 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3252 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2040 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4044 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4408 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1400 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1524 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4120 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5004 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2876 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 740 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4924 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3224 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3732 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1108 1072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5024 1072 schtasks.exe 82 -
resource yara_rule behavioral2/memory/2428-1-0x0000000000B50000-0x0000000000C26000-memory.dmp dcrat behavioral2/files/0x0007000000023cac-11.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe -
Executes dropped EXE 1 IoCs
pid Process 456 winlogon.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\smss.exe 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\services.exe 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Program Files\Windows Portable Devices\csrss.exe 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Program Files\Uninstall Information\RuntimeBroker.exe 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Program Files\ModifiableWindowsApps\RuntimeBroker.exe 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\winlogon.exe 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\upfc.exe 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\ea1d8f6d871115 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\c5b4cb5e9653cc 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Program Files\Windows Portable Devices\886983d96e3d3e 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Program Files\Uninstall Information\9e8d7a4ca61bd9 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\cc11b995f2a76d 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Program Files (x86)\Internet Explorer\69ddcba757bf72 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\Tasks\OfficeClickToRun.exe 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Windows\Tasks\e6c9b481da804f 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Windows\Sun\Java\Deployment\sppsvc.exe 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Windows\Sun\Java\Deployment\0a1fd5f707cd16 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-fsavailux_31bf3856ad364e35_10.0.19041.1_none_60b99066bd2f6d16\System.exe 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Windows\ShellExperiences\TextInputHost.exe 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File opened for modification C:\Windows\ShellExperiences\TextInputHost.exe 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe File created C:\Windows\ShellExperiences\22eafd247d37c3 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3524 schtasks.exe 2888 schtasks.exe 3984 schtasks.exe 3744 schtasks.exe 2244 schtasks.exe 2412 schtasks.exe 2992 schtasks.exe 3296 schtasks.exe 4408 schtasks.exe 2836 schtasks.exe 400 schtasks.exe 2904 schtasks.exe 2876 schtasks.exe 4924 schtasks.exe 3732 schtasks.exe 856 schtasks.exe 2040 schtasks.exe 2156 schtasks.exe 1524 schtasks.exe 4120 schtasks.exe 1996 schtasks.exe 1400 schtasks.exe 2312 schtasks.exe 3648 schtasks.exe 2588 schtasks.exe 2356 schtasks.exe 4940 schtasks.exe 380 schtasks.exe 3252 schtasks.exe 2436 schtasks.exe 740 schtasks.exe 1108 schtasks.exe 2708 schtasks.exe 4708 schtasks.exe 2720 schtasks.exe 5024 schtasks.exe 5068 schtasks.exe 4044 schtasks.exe 3156 schtasks.exe 2508 schtasks.exe 2264 schtasks.exe 2280 schtasks.exe 2276 schtasks.exe 4912 schtasks.exe 3224 schtasks.exe 1688 schtasks.exe 2324 schtasks.exe 2368 schtasks.exe 1988 schtasks.exe 2884 schtasks.exe 5004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 59 IoCs
pid Process 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 456 winlogon.exe 456 winlogon.exe 456 winlogon.exe 456 winlogon.exe 456 winlogon.exe 456 winlogon.exe 456 winlogon.exe 456 winlogon.exe 456 winlogon.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 456 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe Token: SeDebugPrivilege 456 winlogon.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2428 wrote to memory of 660 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 137 PID 2428 wrote to memory of 660 2428 4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe 137 PID 660 wrote to memory of 4432 660 cmd.exe 139 PID 660 wrote to memory of 4432 660 cmd.exe 139 PID 660 wrote to memory of 456 660 cmd.exe 143 PID 660 wrote to memory of 456 660 cmd.exe 143 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe"C:\Users\Admin\AppData\Local\Temp\4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\A1TrE7Ufj6.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:4432
-
-
C:\Program Files (x86)\Windows Media Player\Visualizations\winlogon.exe"C:\Program Files (x86)\Windows Media Player\Visualizations\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 9 /tr "'C:\Windows\ShellExperiences\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\ShellExperiences\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Windows\ShellExperiences\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 5 /tr "'C:\Windows\Tasks\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\Tasks\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Windows\Tasks\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Media Player\Visualizations\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Visualizations\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Media Player\Visualizations\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Internet Explorer\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Windows\Sun\Java\Deployment\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Sun\Java\Deployment\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Windows\Sun\Java\Deployment\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Documents\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Default\Documents\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Documents\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e4084" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e4084" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\4b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Users\Default\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\Default\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Defender\ja-JP\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\ja-JP\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Defender\ja-JP\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\MusNotification.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 9 /tr "'C:\Users\Default\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\Default\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Users\Default\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Uninstall Information\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Uninstall Information\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\All Users\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Users\Public\AccountPictures\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Users\Public\AccountPictures\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
829KB
MD5a054982f7e12c1f491eccd25d9c1b5d7
SHA1b3c78b1c7c8a95486db06e39f56910d0f3e90996
SHA2564b6302643800dafe4629960e243ba26663f8510c42f4eaf656b1cc510406e408
SHA512d57be5af22f21e7c20d330f5714ddcf1936152e3d9bd2254c1a2c83f420bfe183ae204c871b1ce2d8f5361a1661afbe39a9b5bec12fb00195a8c0b967977a925
-
Filesize
236B
MD507661ca296e9bac9dca8c7bc088fa23b
SHA1883ab0e50ac7130e298bd3b2b8f21d65d4a2b961
SHA2560d8aa9a3b528801a6545ffc44fd69f23b24cc901b8d2869b63d9667cf4b21d7d
SHA5128aa73f02b61304ecb2acf47c6375e0e5369b21f59e2bb1c1c6cab137844cb4e1b6bb16febb856fe930ee5bb522b93fbd892cb220441ed7018d93ccfadc96e58b