Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 08:08
Behavioral task
behavioral1
Sample
717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe
Resource
win10v2004-20241007-en
General
-
Target
717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe
-
Size
1.7MB
-
MD5
9ecc3c152d84531b1ceba5d779e60750
-
SHA1
2db878eb2f9bfb50cfa51a12544a3cd4ae337d31
-
SHA256
717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530
-
SHA512
02864e5aaa7a7cf4a321e19eae5fe5e752299775387c52560c1c5c036e3fa7daf79d019f34b77206980a669d11f515a4c6f52c28fbbcdb6ffd616c3c4418fb1b
-
SSDEEP
24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2788 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2600 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2396 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1868 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1596 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2544 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2880 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2420 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1344 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 288 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2004 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2280 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2052 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1952 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3064 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 628 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1800 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2076 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1092 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 944 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1056 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1496 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1892 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1944 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 780 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2448 2844 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2844 schtasks.exe 30 -
resource yara_rule behavioral1/memory/1908-1-0x0000000000AF0000-0x0000000000CA6000-memory.dmp dcrat behavioral1/files/0x000500000001a472-27.dat dcrat behavioral1/files/0x0008000000019931-109.dat dcrat behavioral1/files/0x000700000001a47f-131.dat dcrat behavioral1/files/0x000700000001a485-153.dat dcrat behavioral1/files/0x000b00000001a48b-199.dat dcrat behavioral1/memory/1588-296-0x0000000000340000-0x00000000004F6000-memory.dmp dcrat behavioral1/memory/1528-309-0x00000000001A0000-0x0000000000356000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2388 powershell.exe 2560 powershell.exe 2620 powershell.exe 1600 powershell.exe 2596 powershell.exe 316 powershell.exe 1756 powershell.exe 908 powershell.exe 2516 powershell.exe 1248 powershell.exe 2396 powershell.exe 1472 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe -
Executes dropped EXE 2 IoCs
pid Process 1588 Idle.exe 1528 Idle.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\RCX2438.tmp 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\RCX24A6.tmp 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File opened for modification C:\Program Files\Windows NT\TableTextService\de-DE\System.exe 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\101b941d020240 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\lsass.exe 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File created C:\Program Files\Windows NT\TableTextService\de-DE\System.exe 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\lsm.exe 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File opened for modification C:\Program Files\Windows NT\TableTextService\de-DE\RCX2234.tmp 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\lsm.exe 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File created C:\Program Files\Windows NT\TableTextService\de-DE\27d1bcfc3c54e0 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File created C:\Program Files (x86)\Windows Media Player\Media Renderer\6203df4a6bafc7 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File opened for modification C:\Program Files\Windows NT\TableTextService\de-DE\RCX21C6.tmp 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\RCX2FA7.tmp 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\RCX2FA8.tmp 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File created C:\Program Files (x86)\Windows Media Player\Media Renderer\lsass.exe 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\winsxs\explorer.exe 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File created C:\Windows\es-ES\dwm.exe 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File created C:\Windows\es-ES\6cb0b6c459d5d3 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File opened for modification C:\Windows\es-ES\RCX291C.tmp 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File opened for modification C:\Windows\es-ES\RCX291D.tmp 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe File opened for modification C:\Windows\es-ES\dwm.exe 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1800 schtasks.exe 2076 schtasks.exe 1056 schtasks.exe 1496 schtasks.exe 2560 schtasks.exe 1756 schtasks.exe 1636 schtasks.exe 2112 schtasks.exe 1868 schtasks.exe 2004 schtasks.exe 1952 schtasks.exe 628 schtasks.exe 1640 schtasks.exe 1976 schtasks.exe 2300 schtasks.exe 2544 schtasks.exe 1660 schtasks.exe 1092 schtasks.exe 1892 schtasks.exe 1780 schtasks.exe 2328 schtasks.exe 3044 schtasks.exe 2804 schtasks.exe 2616 schtasks.exe 2384 schtasks.exe 3064 schtasks.exe 944 schtasks.exe 1696 schtasks.exe 1996 schtasks.exe 2600 schtasks.exe 288 schtasks.exe 2280 schtasks.exe 2052 schtasks.exe 1944 schtasks.exe 780 schtasks.exe 1632 schtasks.exe 2788 schtasks.exe 1736 schtasks.exe 2396 schtasks.exe 1596 schtasks.exe 2448 schtasks.exe 3020 schtasks.exe 2880 schtasks.exe 2420 schtasks.exe 1344 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 2620 powershell.exe 908 powershell.exe 1472 powershell.exe 2596 powershell.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 2560 powershell.exe 2396 powershell.exe 1600 powershell.exe 2516 powershell.exe 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 2388 powershell.exe 1756 powershell.exe 316 powershell.exe 1248 powershell.exe 1588 Idle.exe 1588 Idle.exe 1588 Idle.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe Token: SeDebugPrivilege 2620 powershell.exe Token: SeDebugPrivilege 908 powershell.exe Token: SeDebugPrivilege 1472 powershell.exe Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 2560 powershell.exe Token: SeDebugPrivilege 2396 powershell.exe Token: SeDebugPrivilege 1600 powershell.exe Token: SeDebugPrivilege 2516 powershell.exe Token: SeDebugPrivilege 2388 powershell.exe Token: SeDebugPrivilege 1756 powershell.exe Token: SeDebugPrivilege 316 powershell.exe Token: SeDebugPrivilege 1248 powershell.exe Token: SeDebugPrivilege 1588 Idle.exe Token: SeDebugPrivilege 1528 Idle.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2596 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 76 PID 1908 wrote to memory of 2596 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 76 PID 1908 wrote to memory of 2596 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 76 PID 1908 wrote to memory of 1472 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 77 PID 1908 wrote to memory of 1472 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 77 PID 1908 wrote to memory of 1472 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 77 PID 1908 wrote to memory of 2396 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 79 PID 1908 wrote to memory of 2396 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 79 PID 1908 wrote to memory of 2396 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 79 PID 1908 wrote to memory of 1600 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 80 PID 1908 wrote to memory of 1600 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 80 PID 1908 wrote to memory of 1600 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 80 PID 1908 wrote to memory of 2620 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 81 PID 1908 wrote to memory of 2620 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 81 PID 1908 wrote to memory of 2620 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 81 PID 1908 wrote to memory of 2560 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 82 PID 1908 wrote to memory of 2560 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 82 PID 1908 wrote to memory of 2560 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 82 PID 1908 wrote to memory of 1248 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 83 PID 1908 wrote to memory of 1248 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 83 PID 1908 wrote to memory of 1248 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 83 PID 1908 wrote to memory of 2516 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 84 PID 1908 wrote to memory of 2516 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 84 PID 1908 wrote to memory of 2516 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 84 PID 1908 wrote to memory of 908 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 85 PID 1908 wrote to memory of 908 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 85 PID 1908 wrote to memory of 908 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 85 PID 1908 wrote to memory of 2388 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 86 PID 1908 wrote to memory of 2388 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 86 PID 1908 wrote to memory of 2388 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 86 PID 1908 wrote to memory of 316 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 87 PID 1908 wrote to memory of 316 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 87 PID 1908 wrote to memory of 316 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 87 PID 1908 wrote to memory of 1756 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 89 PID 1908 wrote to memory of 1756 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 89 PID 1908 wrote to memory of 1756 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 89 PID 1908 wrote to memory of 1588 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 100 PID 1908 wrote to memory of 1588 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 100 PID 1908 wrote to memory of 1588 1908 717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe 100 PID 1588 wrote to memory of 2228 1588 Idle.exe 101 PID 1588 wrote to memory of 2228 1588 Idle.exe 101 PID 1588 wrote to memory of 2228 1588 Idle.exe 101 PID 1588 wrote to memory of 1140 1588 Idle.exe 102 PID 1588 wrote to memory of 1140 1588 Idle.exe 102 PID 1588 wrote to memory of 1140 1588 Idle.exe 102 PID 2228 wrote to memory of 1528 2228 WScript.exe 103 PID 2228 wrote to memory of 1528 2228 WScript.exe 103 PID 2228 wrote to memory of 1528 2228 WScript.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe"C:\Users\Admin\AppData\Local\Temp\717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe"1⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Users\Public\Recorded TV\Sample Media\Idle.exe"C:\Users\Public\Recorded TV\Sample Media\Idle.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d5a29a54-7e9b-4778-8021-59b990f4b9c3.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Public\Recorded TV\Sample Media\Idle.exe"C:\Users\Public\Recorded TV\Sample Media\Idle.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1aed190d-5fa8-404c-b2d3-0708a33a2ad3.vbs"3⤵PID:1140
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Recorded TV\Sample Media\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Public\Recorded TV\Sample Media\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Recorded TV\Sample Media\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Users\Default\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Users\Default\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Package Cache\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\All Users\Package Cache\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Package Cache\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows NT\TableTextService\de-DE\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\de-DE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows NT\TableTextService\de-DE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Media Player\Media Renderer\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Media Renderer\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Media Player\Media Renderer\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Windows\es-ES\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\es-ES\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Windows\es-ES\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD59ecc3c152d84531b1ceba5d779e60750
SHA12db878eb2f9bfb50cfa51a12544a3cd4ae337d31
SHA256717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530
SHA51202864e5aaa7a7cf4a321e19eae5fe5e752299775387c52560c1c5c036e3fa7daf79d019f34b77206980a669d11f515a4c6f52c28fbbcdb6ffd616c3c4418fb1b
-
Filesize
1.7MB
MD5df0af309241e755c1e11c4b7d177e915
SHA1b32ec90c0417fb5735398b53ab6e5b414a9e874f
SHA256035ce8793924c28b8b9dabb8811a4d8ae4c16f26e531cbe618505662e624f9b5
SHA512482090bb4d3fbc5a1819bf2111281723eda9cae3773fd0ad078f749a609a95d5e8e70e150d6e988ee955dce5c64d8c5f2a7086fc98eea9e8240b2ba11c838cf9
-
Filesize
1.7MB
MD5dc680da25010a3cc393a2604d7831ce3
SHA1944f20f76cd64ed57a8109be1fed60276de4338e
SHA2565ef4119c658a608f7050e97ebac3164390fe2ef696d39a35427c6dc4b9509182
SHA512c96e9b17b0bd45a5530325af25f9c61baa23ef33e4fb903ab4c19424ec6ab59f3904e394615e832228506f14c165855813a7b4c27929a9aa8c4e9093af3981f5
-
Filesize
1.7MB
MD5ac79892caca23c18954b9ee5cae9bdba
SHA176b24bb05e1c3ce2d5e9b5cda982776c523c4218
SHA256ac1477628d2c913bb4c89102bc91dfb32e0122e3459af983105f02da2b035e3d
SHA51296031ceae45e95013f97d0cb9d54a17595bf40139eff7ac15a075c6a5c4c3541b5c65c9d5327a275e8b9239adccb3ad8a8c2d17c0a5b72b3e4101c822a70b6fa
-
Filesize
1.7MB
MD5693e447a779a1c559d2b7c6e6ae3f57a
SHA116194f916d93c9a0b0a64a58b1634722178a0994
SHA256073a7c93efb84e0105048c6b7476756a6c57b400637610833dd1d3fb0cb878c1
SHA512f3ac93116d0d54f3531c271842ecad2c0b31ee0a453e13b825f940a552574cd3abf87b52c4ed75fcc9216cbc8825d22e36244f184a50d40ab9ac9418436ae0be
-
Filesize
501B
MD5dbea908bf0f476400873eb2f28bdb48d
SHA13f4dea8374c9c50c45ad20e3e43d1f2436140757
SHA2563b499c1052373b9a022cd851bfada9fcb6c8ac2461ac590ae029f2cda06c96f0
SHA512387a98cc1f23fed4d1514bb95cda592db3e2e4c983d45d37f9bff6ae4224ce1859ad61dc90b3a2f30c15cf5782c9a5169d9fdc2e09979080e08069de090f67c2
-
Filesize
725B
MD550115f31fe18edbde5c3d8c6bcc10d1d
SHA11989f09ae83a47f755c6d7fa46d488094945b31e
SHA2562631855a4459a46e7d797cdff2124440849e0f9c35d51996a68257f6f17ba891
SHA5128c6438476b2c131d2ca61049b876439f6f35127927b3f8af16505706879f8860d900b82adf608b935ac1b1d4a791cd7a8b1cf2929de7379890d209153d94a908
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\I7DAMF59TJ6VKW4PQ974.temp
Filesize7KB
MD5d0f448080ccd71f035ce9ec22fcf4771
SHA12ad0ffdf24f2ac9ee9964ecd84bb0ede3d7e1257
SHA2562b8e73ebddc4974e6a6039bdec16cc886aa8e05c4f2b159586a25220abc593d0
SHA512e74c07abfe72dbfd6e6491da28bfe1eec064b8c4c305583304c2611c6a382653b635ea496a3b32626d37546c8fe77318adc1f1fe4c362c19e39a9ed0f6ab1bd6