Analysis
-
max time kernel
95s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe
Resource
win10v2004-20241007-en
General
-
Target
26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe
-
Size
2.9MB
-
MD5
19aefa5703872789a85c9c8e7c123aca
-
SHA1
5207463f1ec2987e68c97399571c4ef52763bacc
-
SHA256
26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e
-
SHA512
5117be7adb0b42505ce453a3f6e3cb73ed5b71c186ff660d7cceb92b11ab89bbf897f48a3a05d19e63fe69361bc58276c99b1d93eb3173c01f379a11b0850c70
-
SSDEEP
49152:7wefjxPCEjdphA8ZLUj+khAHYevjm7rDeqYQjmCYi78jFg:7zqCA85UuHYeLu0PCYi78a
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 13 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4020 4796 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4764 4796 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1980 4796 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5084 4796 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5076 4796 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4696 4796 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 4796 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3728 4796 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3196 4796 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 4796 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 4796 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1124 4796 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4876 4796 schtasks.exe 84 -
resource yara_rule behavioral2/memory/2752-1-0x0000000000500000-0x0000000000B48000-memory.dmp dcrat behavioral2/memory/2752-2-0x0000000000500000-0x0000000000B48000-memory.dmp dcrat behavioral2/memory/2752-25-0x0000000000500000-0x0000000000B48000-memory.dmp dcrat behavioral2/memory/1524-27-0x0000000000500000-0x0000000000B48000-memory.dmp dcrat behavioral2/memory/1524-28-0x0000000000500000-0x0000000000B48000-memory.dmp dcrat behavioral2/memory/1524-52-0x0000000000500000-0x0000000000B48000-memory.dmp dcrat behavioral2/memory/2896-53-0x0000000000E30000-0x0000000001478000-memory.dmp dcrat behavioral2/memory/2896-54-0x0000000000E30000-0x0000000001478000-memory.dmp dcrat behavioral2/memory/2896-58-0x0000000000E30000-0x0000000001478000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WmiPrvSE.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WmiPrvSE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WmiPrvSE.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe -
Executes dropped EXE 1 IoCs
pid Process 2896 WmiPrvSE.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine WmiPrvSE.exe -
Adds Run key to start application 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20241007091301_001_dotnet_hostfxr_7.0.16_win_x64.msi\\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files\\Common Files\\microsoft shared\\ClickToRun\\C2RINTL.de-de\\OfficeClickToRun.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Windows\\appcompat\\taskhostw.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\System32\\KBDBE\\fontdrvhost.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\mfc100chs\\dwm.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\System32\\KBDCZ2\\spoolsv.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\System32\\RegCtrl\\fontdrvhost.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\ProgramData\\Templates\\WmiPrvSE.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Windows\\System32\\mssph\\taskhostw.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Windows\\RemotePackages\\RemoteDesktops\\services.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\mciwave\\dllhost.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Windows\\System32\\wmdmps\\conhost.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files\\Windows Portable Devices\\OfficeClickToRun.exe\"" 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File created C:\Windows\SysWOW64\KBDCZ2\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\mfc100chs\dwm.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File opened for modification C:\Windows\SysWOW64\mciwave\dllhost.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\mciwave\5940a34987c99120d96dace90a3f93f329dcad63 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\KBDCZ2\spoolsv.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\KBDBE\fontdrvhost.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File opened for modification C:\Windows\SysWOW64\RegCtrl\fontdrvhost.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\RegCtrl\5b884080fd4f94e2695da25c503f9e33b9605b83 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\mssph\taskhostw.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\mssph\ea9f0e6c9e2dcd4dfacdaf29ba21541fb815a988 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\wmdmps\088424020bedd6b28ac7fd22ee35dcd7322895ce 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\KBDBE\5b884080fd4f94e2695da25c503f9e33b9605b83 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\mfc100chs\6cb0b6c459d5d3455a3da700e713f2e2529862ff 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\mciwave\dllhost.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\wmdmps\conhost.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\SysWOW64\RegCtrl\fontdrvhost.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2752 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 1524 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 2896 WmiPrvSE.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Windows Portable Devices\OfficeClickToRun.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Program Files\Windows Portable Devices\e6c9b481da804f07baff8eff543b0a1441069b5d 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.de-de\OfficeClickToRun.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.de-de\e6c9b481da804f07baff8eff543b0a1441069b5d 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\appcompat\ea9f0e6c9e2dcd4dfacdaf29ba21541fb815a988 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\CSC\TextInputHost.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\RemotePackages\RemoteDesktops\services.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\RemotePackages\RemoteDesktops\c5b4cb5e9653cce737f29f72ba880dd4c4bab27d 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe File created C:\Windows\appcompat\taskhostw.exe 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WmiPrvSE.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3196 schtasks.exe 1124 schtasks.exe 4020 schtasks.exe 4764 schtasks.exe 5084 schtasks.exe 2148 schtasks.exe 2328 schtasks.exe 1972 schtasks.exe 4876 schtasks.exe 1980 schtasks.exe 5076 schtasks.exe 4696 schtasks.exe 3728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2752 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 2752 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 2752 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 2752 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 2752 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 1524 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 1524 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 1524 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 1524 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 1524 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 1524 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 1524 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 2896 WmiPrvSE.exe 2896 WmiPrvSE.exe 2896 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2752 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Token: SeDebugPrivilege 1524 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe Token: SeDebugPrivilege 2896 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2752 wrote to memory of 1524 2752 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 94 PID 2752 wrote to memory of 1524 2752 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 94 PID 2752 wrote to memory of 1524 2752 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 94 PID 1524 wrote to memory of 2896 1524 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 101 PID 1524 wrote to memory of 2896 1524 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 101 PID 1524 wrote to memory of 2896 1524 26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe"C:\Users\Admin\AppData\Local\Temp\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe"C:\Users\Admin\AppData\Local\Temp\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\ProgramData\Templates\WmiPrvSE.exe"C:\ProgramData\Templates\WmiPrvSE.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\mciwave\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\System32\wmdmps\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\appcompat\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\KBDCZ2\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\KBDBE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\mfc100chs\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20241007091301_001_dotnet_hostfxr_7.0.16_win_x64.msi\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\RegCtrl\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.de-de\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\ProgramData\Templates\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\System32\mssph\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\RemotePackages\RemoteDesktops\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4876
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe.log
Filesize1KB
MD5f5e93a467b0f78f860ff2ba798c5fd2c
SHA1462b6677af76647b0c08fe91d019cb29d364f616
SHA256fa2d2b185ce7cfa214b0c9a8b26c9d30ac325c924434f957c2f3e0bb74a749cf
SHA512b50b1a0aeff65a77574897654ace4a3b518e5f9192c74e516c84ff6796e52ad811c23caa1ac7d52449601a1004c9cc3a734c3a10a94d67750eb771ca0a7f2e25
-
Filesize
2.9MB
MD519aefa5703872789a85c9c8e7c123aca
SHA15207463f1ec2987e68c97399571c4ef52763bacc
SHA25626c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e
SHA5125117be7adb0b42505ce453a3f6e3cb73ed5b71c186ff660d7cceb92b11ab89bbf897f48a3a05d19e63fe69361bc58276c99b1d93eb3173c01f379a11b0850c70