Analysis
-
max time kernel
118s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 23:31
Behavioral task
behavioral1
Sample
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe
Resource
win10v2004-20241007-en
General
-
Target
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe
-
Size
2.6MB
-
MD5
0163b78fa3d6908eb367abed8f3e9e94
-
SHA1
240609d82a62a8017ad3d81ac4271cd7606b5573
-
SHA256
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773
-
SHA512
f0258f74d10b9d1f3cfab6c36afe7e411b9c3cea7641529b5fc3e62706787c9685b6dfccf3fdde708102b43f517a734572da77407f9f4f1d94754fdec1554748
-
SSDEEP
49152:Z35SQwOGHHy3Gv6KelFCGDZPU542T5eYfn4jmnHwDKni5JsJ:ZpSQEHIKqFCGDZs54+5eYfnCMQ+i5Ja
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2224 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2660 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2796 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2464 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1880 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1312 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 912 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 784 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1260 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2856 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 604 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2408 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 324 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2532 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1352 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1448 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 840 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2892 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1144 2892 schtasks.exe 30 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
resource yara_rule behavioral1/memory/1872-1-0x00000000003F0000-0x0000000000698000-memory.dmp dcrat behavioral1/files/0x0006000000016d9a-27.dat dcrat behavioral1/files/0x000d000000016d3e-138.dat dcrat behavioral1/files/0x00070000000173f4-155.dat dcrat behavioral1/memory/2328-195-0x00000000010D0000-0x0000000001378000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2328 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Reference Assemblies\RCXC88E.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\winlogon.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Uninstall Information\RCXC185.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Uninstall Information\RCXC196.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\RCXC820.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\RCXCD62.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\RCXCD33.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files (x86)\Uninstall Information\explorer.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files (x86)\Uninstall Information\7a0fd90576e088 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files (x86)\Reference Assemblies\winlogon.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files (x86)\Reference Assemblies\cc11b995f2a76d 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\VideoLAN\VLC\plugins\services.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Program Files\VideoLAN\VLC\plugins\c5b4cb5e9653cc 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Program Files (x86)\Uninstall Information\explorer.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File created C:\Windows\debug\WIA\dwm.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\debug\WIA\6cb0b6c459d5d3 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\L2Schemas\62a6f6c287429c 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\debug\WIA\RCXB8F6.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\L2Schemas\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\system\RCXCAC1.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\es-ES\dllhost.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\es-ES\5940a34987c991 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\it-IT\RCXCFA5.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\it-IT\RCXCFA6.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\it-IT\lsm.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\system\RCXCAC2.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\L2Schemas\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\system\7a0fd90576e088 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\debug\WIA\RCXB8F5.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\L2Schemas\RCXBF80.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\L2Schemas\RCXBF81.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\es-ES\RCXC39A.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\es-ES\dllhost.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\debug\WIA\dwm.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\system\explorer.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\it-IT\lsm.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File created C:\Windows\it-IT\101b941d020240 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\es-ES\RCXC399.tmp 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe File opened for modification C:\Windows\system\explorer.exe 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2328 schtasks.exe 2464 schtasks.exe 1796 schtasks.exe 2408 schtasks.exe 1448 schtasks.exe 2148 schtasks.exe 2940 schtasks.exe 1312 schtasks.exe 912 schtasks.exe 604 schtasks.exe 2976 schtasks.exe 1044 schtasks.exe 2532 schtasks.exe 2616 schtasks.exe 2492 schtasks.exe 1988 schtasks.exe 2820 schtasks.exe 3052 schtasks.exe 1144 schtasks.exe 2224 schtasks.exe 1352 schtasks.exe 2660 schtasks.exe 2796 schtasks.exe 2644 schtasks.exe 1880 schtasks.exe 2960 schtasks.exe 1260 schtasks.exe 2856 schtasks.exe 2008 schtasks.exe 2284 schtasks.exe 840 schtasks.exe 2736 schtasks.exe 784 schtasks.exe 2036 schtasks.exe 3012 schtasks.exe 324 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1872 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1872 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1872 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1872 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 1872 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 2328 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 2328 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 2328 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 2328 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 2328 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 2328 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 2328 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 2328 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 2328 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2328 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1872 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Token: SeDebugPrivilege 2328 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2328 1872 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 67 PID 1872 wrote to memory of 2328 1872 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 67 PID 1872 wrote to memory of 2328 1872 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe 67 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe"C:\Users\Admin\AppData\Local\Temp\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1872 -
C:\Windows\L2Schemas\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe"C:\Windows\L2Schemas\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2328
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Windows\debug\WIA\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\debug\WIA\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Windows\debug\WIA\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Downloads\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Public\Downloads\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Downloads\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e817736" /sc MINUTE /mo 14 /tr "'C:\Windows\L2Schemas\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773" /sc ONLOGON /tr "'C:\Windows\L2Schemas\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e817736" /sc MINUTE /mo 5 /tr "'C:\Windows\L2Schemas\6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Uninstall Information\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Uninstall Information\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Uninstall Information\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Windows\es-ES\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\es-ES\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\es-ES\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Reference Assemblies\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Reference Assemblies\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Windows\system\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\system\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Windows\system\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Program Files\VideoLAN\VLC\plugins\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\plugins\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Program Files\VideoLAN\VLC\plugins\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\Windows\it-IT\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\it-IT\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\Windows\it-IT\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1144
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5c774e205a598de085abc97863657f7e9
SHA18dd8360b2c041004aad94170bfc292fea74c48ee
SHA256cd96d81312602fffa501a8d2a8993acbf3b8af9898fe8f7713fb4841127e1bb2
SHA512d0e71e5638024f8a61485f82876c92267e94ca236e44700a14b02b18f83e35eda275d6520ea0d1209618bb8e0bda99b6a78a3c6f1cc0ae9b107828466943508a
-
Filesize
2.6MB
MD50163b78fa3d6908eb367abed8f3e9e94
SHA1240609d82a62a8017ad3d81ac4271cd7606b5573
SHA2566a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773
SHA512f0258f74d10b9d1f3cfab6c36afe7e411b9c3cea7641529b5fc3e62706787c9685b6dfccf3fdde708102b43f517a734572da77407f9f4f1d94754fdec1554748
-
Filesize
2.6MB
MD57917e5d3815aad26fe12e60c95f4f922
SHA194358af86a03a9d2ed94d239810e9efd42fe3614
SHA256f969ff948ac424f0add5ecd094a5dda0a7cf82e431d02f1c1491ccd8df81dc57
SHA512cef2858374355e9a962cc2fed622c0e67d2c45041bd087f5a4cb9d6ee52a925136f0865014136de9e5e62e11983f2eac401895dd615e7c372c0316019cede3e7