Analysis
-
max time kernel
117s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 21:36
Static task
static1
Behavioral task
behavioral1
Sample
382EAEDC34BFC15B7E749FB8A0CFF600.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
382EAEDC34BFC15B7E749FB8A0CFF600.exe
Resource
win10v2004-20241007-en
General
-
Target
382EAEDC34BFC15B7E749FB8A0CFF600.exe
-
Size
1.8MB
-
MD5
382eaedc34bfc15b7e749fb8a0cff600
-
SHA1
d8729997725a187120ee95e1d6068586a13ab678
-
SHA256
e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847a
-
SHA512
f2be10566728f10a1396abf3115a01d98a5b06d18b94e84ecb6fbb012f1ad3ad588be84f09ceafa55bc9fd65a7e6763c68ca67596141c750ae54a2bebfc5c16b
-
SSDEEP
24576:nfNh6iTrBgSq+kdkpupwocpF4jGdWWfWanontd7ksYKtAwqgKchGGqGLk6kIv/D5:f3/kGAwaCYO4ngs7wg8UkcX
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\addins\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\ja\\audiodg.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\addins\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\ja\\audiodg.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\lsass.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\addins\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\ja\\audiodg.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\lsass.exe\", \"C:\\Windows\\Downloaded Program Files\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\addins\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\ja\\audiodg.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\lsass.exe\", \"C:\\Windows\\Downloaded Program Files\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\taskhost.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\addins\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\ja\\audiodg.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\lsass.exe\", \"C:\\Windows\\Downloaded Program Files\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\taskhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\addins\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2600 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2320 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 776 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 992 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1496 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 824 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2060 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2788 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1824 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1304 2688 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 2688 schtasks.exe 28 -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2804 powershell.exe 1720 powershell.exe 1736 powershell.exe 2020 powershell.exe 2796 powershell.exe 2824 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1244 audiodg.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\382EAEDC34BFC15B7E749FB8A0CFF600 = "\"C:\\Windows\\addins\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\ja\\audiodg.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\ja\\audiodg.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\taskhost.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\taskhost.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\382EAEDC34BFC15B7E749FB8A0CFF600 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\382EAEDC34BFC15B7E749FB8A0CFF600 = "\"C:\\Windows\\addins\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\lsass.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\382EAEDC34BFC15B7E749FB8A0CFF600 = "\"C:\\Windows\\Downloaded Program Files\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\382EAEDC34BFC15B7E749FB8A0CFF600 = "\"C:\\Windows\\Downloaded Program Files\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\382EAEDC34BFC15B7E749FB8A0CFF600 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\382EAEDC34BFC15B7E749FB8A0CFF600.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\lsass.exe\"" 382EAEDC34BFC15B7E749FB8A0CFF600.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\9w3j6e.exe csc.exe File created \??\c:\Windows\System32\CSC5AE8843693C049FFB0485929853E9F6.TMP csc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\audiodg.exe 382EAEDC34BFC15B7E749FB8A0CFF600.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\42af1c969fbb7b 382EAEDC34BFC15B7E749FB8A0CFF600.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Downloaded Program Files\382EAEDC34BFC15B7E749FB8A0CFF600.exe 382EAEDC34BFC15B7E749FB8A0CFF600.exe File created C:\Windows\Downloaded Program Files\16837856da8ee0 382EAEDC34BFC15B7E749FB8A0CFF600.exe File created C:\Windows\addins\382EAEDC34BFC15B7E749FB8A0CFF600.exe 382EAEDC34BFC15B7E749FB8A0CFF600.exe File created C:\Windows\addins\16837856da8ee0 382EAEDC34BFC15B7E749FB8A0CFF600.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2320 schtasks.exe 1496 schtasks.exe 2960 schtasks.exe 2060 schtasks.exe 2572 schtasks.exe 1644 schtasks.exe 824 schtasks.exe 2760 schtasks.exe 2920 schtasks.exe 2600 schtasks.exe 776 schtasks.exe 1824 schtasks.exe 992 schtasks.exe 3060 schtasks.exe 2788 schtasks.exe 1740 schtasks.exe 1688 schtasks.exe 1304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 1720 powershell.exe 2804 powershell.exe 2796 powershell.exe 1736 powershell.exe 2824 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe Token: SeDebugPrivilege 1720 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 2796 powershell.exe Token: SeDebugPrivilege 1736 powershell.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeDebugPrivilege 1244 audiodg.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2592 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 32 PID 1700 wrote to memory of 2592 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 32 PID 1700 wrote to memory of 2592 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 32 PID 2592 wrote to memory of 2200 2592 csc.exe 34 PID 2592 wrote to memory of 2200 2592 csc.exe 34 PID 2592 wrote to memory of 2200 2592 csc.exe 34 PID 1700 wrote to memory of 1720 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 50 PID 1700 wrote to memory of 1720 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 50 PID 1700 wrote to memory of 1720 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 50 PID 1700 wrote to memory of 2804 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 51 PID 1700 wrote to memory of 2804 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 51 PID 1700 wrote to memory of 2804 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 51 PID 1700 wrote to memory of 2824 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 53 PID 1700 wrote to memory of 2824 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 53 PID 1700 wrote to memory of 2824 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 53 PID 1700 wrote to memory of 2796 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 54 PID 1700 wrote to memory of 2796 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 54 PID 1700 wrote to memory of 2796 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 54 PID 1700 wrote to memory of 2020 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 55 PID 1700 wrote to memory of 2020 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 55 PID 1700 wrote to memory of 2020 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 55 PID 1700 wrote to memory of 1736 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 56 PID 1700 wrote to memory of 1736 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 56 PID 1700 wrote to memory of 1736 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 56 PID 1700 wrote to memory of 2148 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 62 PID 1700 wrote to memory of 2148 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 62 PID 1700 wrote to memory of 2148 1700 382EAEDC34BFC15B7E749FB8A0CFF600.exe 62 PID 2148 wrote to memory of 1548 2148 cmd.exe 64 PID 2148 wrote to memory of 1548 2148 cmd.exe 64 PID 2148 wrote to memory of 1548 2148 cmd.exe 64 PID 2148 wrote to memory of 1556 2148 cmd.exe 65 PID 2148 wrote to memory of 1556 2148 cmd.exe 65 PID 2148 wrote to memory of 1556 2148 cmd.exe 65 PID 2148 wrote to memory of 1244 2148 cmd.exe 66 PID 2148 wrote to memory of 1244 2148 cmd.exe 66 PID 2148 wrote to memory of 1244 2148 cmd.exe 66 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\382EAEDC34BFC15B7E749FB8A0CFF600.exe"C:\Users\Admin\AppData\Local\Temp\382EAEDC34BFC15B7E749FB8A0CFF600.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\g4uez23h\g4uez23h.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7CBE.tmp" "c:\Windows\System32\CSC5AE8843693C049FFB0485929853E9F6.TMP"3⤵PID:2200
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\addins\382EAEDC34BFC15B7E749FB8A0CFF600.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\audiodg.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\lsass.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Downloaded Program Files\382EAEDC34BFC15B7E749FB8A0CFF600.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\382EAEDC34BFC15B7E749FB8A0CFF600.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\K6WpQQzDh2.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1548
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1556
-
-
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\audiodg.exe"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\audiodg.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "382EAEDC34BFC15B7E749FB8A0CFF6003" /sc MINUTE /mo 10 /tr "'C:\Windows\addins\382EAEDC34BFC15B7E749FB8A0CFF600.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "382EAEDC34BFC15B7E749FB8A0CFF600" /sc ONLOGON /tr "'C:\Windows\addins\382EAEDC34BFC15B7E749FB8A0CFF600.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "382EAEDC34BFC15B7E749FB8A0CFF6003" /sc MINUTE /mo 10 /tr "'C:\Windows\addins\382EAEDC34BFC15B7E749FB8A0CFF600.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "382EAEDC34BFC15B7E749FB8A0CFF6003" /sc MINUTE /mo 12 /tr "'C:\Windows\Downloaded Program Files\382EAEDC34BFC15B7E749FB8A0CFF600.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "382EAEDC34BFC15B7E749FB8A0CFF600" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\382EAEDC34BFC15B7E749FB8A0CFF600.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "382EAEDC34BFC15B7E749FB8A0CFF6003" /sc MINUTE /mo 8 /tr "'C:\Windows\Downloaded Program Files\382EAEDC34BFC15B7E749FB8A0CFF600.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "382EAEDC34BFC15B7E749FB8A0CFF6003" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\Temp\382EAEDC34BFC15B7E749FB8A0CFF600.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "382EAEDC34BFC15B7E749FB8A0CFF600" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\382EAEDC34BFC15B7E749FB8A0CFF600.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "382EAEDC34BFC15B7E749FB8A0CFF6003" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\Temp\382EAEDC34BFC15B7E749FB8A0CFF600.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253B
MD5fc6692bd9357f21a4c289eef87cd6207
SHA10e8062f2e57c6523c55f7112055f59bcbd8cc257
SHA25629fd83c8ea10dff029e824d6733fe8ab6a098b31e276b66691b6b045b36c2b11
SHA512326b8d42bbffe1a3968ca8b62eb722770f56408cadc211dd5d51ee9eedb013ad3b2a0a3e33b11f89cf9346ed7e852e87ee878da298c8f4361b7869e4a65fa3dd
-
Filesize
1KB
MD5e7617f8d970362e5320d55cbf7728383
SHA13670f4f0913889f2092b26c55342ebc30fa65e04
SHA256ae74cda34d77bedb56c59b7e26e394591fe76bf97b2cd90d2df7cb8c1974c17c
SHA5127d6626c805a1a18aac145f7b0ec41b0e53b207cb9e6f8ec222a0eac44211cb1228f8c235dace180512e84c021f73b682772ace53fc1dd061dc2859613af90b5f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD51ae551fe5bfc4be187d61a17e90cf7fe
SHA1cb9776618d2de9bd2a00754d9129590b7caf3a00
SHA2566796b8791f44fad232a9fe5cdf0404ba5f20599ac148605ab07e61540259f46b
SHA5128257c4cc97845927dffd0cf8297d915118cbafd5c44819cec36e25fc8162ddd103c47ec17fd2fffcfe6ced59eea28865ce2d1fe6c0d6ac792d791e9a0b977d0d
-
Filesize
1.8MB
MD5382eaedc34bfc15b7e749fb8a0cff600
SHA1d8729997725a187120ee95e1d6068586a13ab678
SHA256e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847a
SHA512f2be10566728f10a1396abf3115a01d98a5b06d18b94e84ecb6fbb012f1ad3ad588be84f09ceafa55bc9fd65a7e6763c68ca67596141c750ae54a2bebfc5c16b
-
Filesize
386B
MD51012f0314b94070778947d2fa59b326d
SHA12a8766b2d9ef24b947bbfbe1ee760a8e353d6d9a
SHA2562c96cbf01686a1c47cb510ebf0a06ccbc6da0b8c2309d7d6effd0c95d9818779
SHA5121b65194020032cf8d381176ea1d4b20709e156b79b581b180e49a1616cb8a99ecaddf5c3a9ed3acd9c67cec187265d0eb19c0fcd7e008f7e94debcbd6187a7a7
-
Filesize
235B
MD520b13ad3bc312990f4c0aa05d3869c42
SHA1ca0c2cd8533d7d817c1105c7de466b068a1da83d
SHA256d06243094c2ed963cc86065c1a27dc6d0f157db49ea441f0f4f457f931718273
SHA512da52a5785376b4d93f6629ed87113f6f5b4fcefa20b4ddff373f0b1267ae2ed83b168ac648276349e03628e7d4007d05adcf0f0aec2f26e84562149da04e6de5
-
Filesize
1KB
MD570046c6c63d509bb29450ef32b59dda3
SHA126802b73997ee22a7cd3d07ae77016969603cf00
SHA256dd0e7409cd9412eafdd8f881d6094fb539ad19c7a54d76043de655a00f80f5d0
SHA512d7b8d4ed84b8e1f5e416c378872bb7bc6d884341f0aa76f2c3b664f1ad0324a2d749c51718f3940d61663d152c35ba241ce0def03a002c6423a4d0957866c96f