Resubmissions
25-11-2024 10:00
241125-l129jaxlhr 1025-11-2024 09:58
241125-lzk9ma1kg1 1025-11-2024 09:56
241125-lyt55s1kew 1025-11-2024 09:46
241125-lrsnqswral 10Analysis
-
max time kernel
1795s -
max time network
1796s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 09:56
Behavioral task
behavioral1
Sample
EXECUTOR METEOR .exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
EXECUTOR METEOR .exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
EXECUTOR METEOR .exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
EXECUTOR METEOR .exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
EXECUTOR METEOR .exe
Resource
win11-20241007-en
General
-
Target
EXECUTOR METEOR .exe
-
Size
1.1MB
-
MD5
e5be94d6e847bb7656e80201cacf67fb
-
SHA1
cc1ce69eea609b5fc9ff18f09407b934690bcff3
-
SHA256
be5c49fa94be78520ee83ed6230a80aaf0ae9dd4bb2d6053aa8f843131f2f506
-
SHA512
306c26f1e72a32c479b8d9112e2e0c5d22fd0e46b02ae5fa7ffff51191c9d79a52a2dbe7d200e0dc9cccf0919cba3693905c8b2dc6c6fc8f3d7eaf883e388100
-
SSDEEP
24576:U2G/nvxW3Ww0tiUfTyqyg1hIZ9XWp7wJO:UbA30L+ixx
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 39 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2780 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3068 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2532 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2584 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1368 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2032 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1404 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1524 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2364 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1272 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1784 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 468 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2080 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 316 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3008 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1580 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1952 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 860 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1020 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 888 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1184 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 944 2696 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1004 2696 schtasks.exe 35 -
resource yara_rule behavioral2/files/0x0008000000016de4-12.dat dcrat behavioral2/memory/2740-13-0x0000000000390000-0x0000000000466000-memory.dmp dcrat behavioral2/memory/1080-46-0x0000000001220000-0x00000000012F6000-memory.dmp dcrat behavioral2/memory/2476-56-0x0000000000ED0000-0x0000000000FA6000-memory.dmp dcrat behavioral2/memory/3036-58-0x0000000000AB0000-0x0000000000B86000-memory.dmp dcrat behavioral2/memory/1768-64-0x0000000000E30000-0x0000000000F06000-memory.dmp dcrat behavioral2/memory/1852-78-0x0000000000E00000-0x0000000000ED6000-memory.dmp dcrat behavioral2/memory/2776-79-0x0000000000B50000-0x0000000000C26000-memory.dmp dcrat behavioral2/memory/496-82-0x00000000012C0000-0x0000000001396000-memory.dmp dcrat behavioral2/memory/1748-91-0x0000000001120000-0x00000000011F6000-memory.dmp dcrat behavioral2/memory/2300-89-0x0000000000E40000-0x0000000000F16000-memory.dmp dcrat behavioral2/memory/2572-103-0x0000000001380000-0x0000000001456000-memory.dmp dcrat behavioral2/memory/3068-106-0x0000000000DB0000-0x0000000000E86000-memory.dmp dcrat behavioral2/memory/2804-102-0x0000000001180000-0x0000000001256000-memory.dmp dcrat behavioral2/memory/2280-112-0x00000000002A0000-0x0000000000376000-memory.dmp dcrat behavioral2/memory/2348-115-0x0000000001090000-0x0000000001166000-memory.dmp dcrat behavioral2/memory/568-119-0x0000000000260000-0x0000000000336000-memory.dmp dcrat behavioral2/memory/2984-120-0x00000000000A0000-0x0000000000176000-memory.dmp dcrat behavioral2/memory/2148-122-0x0000000000200000-0x00000000002D6000-memory.dmp dcrat behavioral2/memory/1000-126-0x0000000000110000-0x00000000001E6000-memory.dmp dcrat behavioral2/memory/2872-129-0x0000000000D20000-0x0000000000DF6000-memory.dmp dcrat behavioral2/memory/2720-132-0x00000000009A0000-0x0000000000A76000-memory.dmp dcrat behavioral2/memory/2544-134-0x0000000000340000-0x0000000000416000-memory.dmp dcrat behavioral2/memory/3016-135-0x0000000001270000-0x0000000001346000-memory.dmp dcrat behavioral2/memory/2184-137-0x00000000011E0000-0x00000000012B6000-memory.dmp dcrat behavioral2/memory/2164-141-0x0000000001000000-0x00000000010D6000-memory.dmp dcrat behavioral2/memory/1448-143-0x00000000012B0000-0x0000000001386000-memory.dmp dcrat behavioral2/memory/1992-148-0x00000000010A0000-0x0000000001176000-memory.dmp dcrat behavioral2/memory/3012-149-0x0000000000250000-0x0000000000326000-memory.dmp dcrat -
Executes dropped EXE 40 IoCs
pid Process 2740 surrogateRuntime.exe 1080 conhost.exe 2476 audiodg.exe 3036 csrss.exe 1768 dllhost.exe 2776 wininit.exe 1852 cmd.exe 496 OSPPSVC.exe 2300 services.exe 860 audiodg.exe 1748 csrss.exe 2012 conhost.exe 2804 dllhost.exe 2572 dwm.exe 3068 smss.exe 2280 winlogon.exe 1772 csrss.exe 2348 audiodg.exe 2984 wininit.exe 2972 cmd.exe 568 OSPPSVC.exe 2148 dllhost.exe 1936 services.exe 1000 audiodg.exe 1680 csrss.exe 2368 conhost.exe 2872 wininit.exe 2544 cmd.exe 2720 OSPPSVC.exe 3016 dllhost.exe 2184 smss.exe 2848 dwm.exe 2164 audiodg.exe 2484 csrss.exe 1448 winlogon.exe 1792 dllhost.exe 916 audiodg.exe 1992 services.exe 3012 csrss.exe 2668 conhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2644 cmd.exe 2644 cmd.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Photo Viewer\ebf1f9fa8afd6d surrogateRuntime.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe surrogateRuntime.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\42af1c969fbb7b surrogateRuntime.exe File created C:\Program Files\Internet Explorer\es-ES\csrss.exe surrogateRuntime.exe File created C:\Program Files\Internet Explorer\es-ES\886983d96e3d3e surrogateRuntime.exe File created C:\Program Files (x86)\Windows Photo Viewer\cmd.exe surrogateRuntime.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\schemas\conhost.exe surrogateRuntime.exe File created C:\Windows\schemas\088424020bedd6 surrogateRuntime.exe File created C:\Windows\PCHEALTH\winlogon.exe surrogateRuntime.exe File created C:\Windows\PCHEALTH\cc11b995f2a76d surrogateRuntime.exe File created C:\Windows\Vss\OSPPSVC.exe surrogateRuntime.exe File created C:\Windows\Vss\1610b97d3ab4a7 surrogateRuntime.exe File created C:\Windows\schemas\conhost.exe surrogateRuntime.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXECUTOR METEOR .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 39 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1784 schtasks.exe 2976 schtasks.exe 2508 schtasks.exe 944 schtasks.exe 3068 schtasks.exe 2532 schtasks.exe 1404 schtasks.exe 1756 schtasks.exe 3024 schtasks.exe 1580 schtasks.exe 1088 schtasks.exe 1020 schtasks.exe 888 schtasks.exe 2584 schtasks.exe 2364 schtasks.exe 1988 schtasks.exe 316 schtasks.exe 1272 schtasks.exe 3008 schtasks.exe 2780 schtasks.exe 2708 schtasks.exe 2032 schtasks.exe 2596 schtasks.exe 468 schtasks.exe 1952 schtasks.exe 1524 schtasks.exe 3004 schtasks.exe 2080 schtasks.exe 1992 schtasks.exe 1184 schtasks.exe 1004 schtasks.exe 2192 schtasks.exe 1368 schtasks.exe 760 schtasks.exe 2604 schtasks.exe 1520 schtasks.exe 1740 schtasks.exe 2300 schtasks.exe 860 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2740 surrogateRuntime.exe 1080 conhost.exe 1080 conhost.exe 1080 conhost.exe 1080 conhost.exe 1080 conhost.exe 1080 conhost.exe 1080 conhost.exe 1080 conhost.exe 1080 conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1080 conhost.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeDebugPrivilege 2740 surrogateRuntime.exe Token: SeDebugPrivilege 1080 conhost.exe Token: SeDebugPrivilege 2476 audiodg.exe Token: SeDebugPrivilege 3036 csrss.exe Token: SeDebugPrivilege 1768 dllhost.exe Token: SeDebugPrivilege 1852 cmd.exe Token: SeDebugPrivilege 2776 wininit.exe Token: SeDebugPrivilege 496 OSPPSVC.exe Token: SeDebugPrivilege 1748 csrss.exe Token: SeDebugPrivilege 2300 services.exe Token: SeDebugPrivilege 2012 conhost.exe Token: SeDebugPrivilege 860 audiodg.exe Token: SeDebugPrivilege 2804 dllhost.exe Token: SeDebugPrivilege 2572 dwm.exe Token: SeDebugPrivilege 3068 smss.exe Token: SeDebugPrivilege 2280 winlogon.exe Token: SeDebugPrivilege 2348 audiodg.exe Token: SeDebugPrivilege 1772 csrss.exe Token: SeDebugPrivilege 2972 cmd.exe Token: SeDebugPrivilege 2984 wininit.exe Token: SeDebugPrivilege 568 OSPPSVC.exe Token: SeDebugPrivilege 2148 dllhost.exe Token: SeDebugPrivilege 1000 audiodg.exe Token: SeDebugPrivilege 1680 csrss.exe Token: SeDebugPrivilege 1936 services.exe Token: SeDebugPrivilege 2368 conhost.exe Token: SeDebugPrivilege 2720 OSPPSVC.exe Token: SeDebugPrivilege 3016 dllhost.exe Token: SeDebugPrivilege 2872 wininit.exe Token: SeDebugPrivilege 2184 smss.exe Token: SeDebugPrivilege 2848 dwm.exe Token: SeDebugPrivilege 2544 cmd.exe Token: SeDebugPrivilege 2484 csrss.exe Token: SeDebugPrivilege 2164 audiodg.exe Token: SeDebugPrivilege 1448 winlogon.exe Token: SeDebugPrivilege 1792 dllhost.exe Token: SeDebugPrivilege 1992 services.exe Token: SeDebugPrivilege 916 audiodg.exe Token: SeDebugPrivilege 3012 csrss.exe Token: SeDebugPrivilege 2668 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 304 1800 EXECUTOR METEOR .exe 31 PID 1800 wrote to memory of 304 1800 EXECUTOR METEOR .exe 31 PID 1800 wrote to memory of 304 1800 EXECUTOR METEOR .exe 31 PID 1800 wrote to memory of 304 1800 EXECUTOR METEOR .exe 31 PID 304 wrote to memory of 2644 304 WScript.exe 32 PID 304 wrote to memory of 2644 304 WScript.exe 32 PID 304 wrote to memory of 2644 304 WScript.exe 32 PID 304 wrote to memory of 2644 304 WScript.exe 32 PID 2644 wrote to memory of 2740 2644 cmd.exe 34 PID 2644 wrote to memory of 2740 2644 cmd.exe 34 PID 2644 wrote to memory of 2740 2644 cmd.exe 34 PID 2644 wrote to memory of 2740 2644 cmd.exe 34 PID 2740 wrote to memory of 1080 2740 surrogateRuntime.exe 75 PID 2740 wrote to memory of 1080 2740 surrogateRuntime.exe 75 PID 2740 wrote to memory of 1080 2740 surrogateRuntime.exe 75 PID 2740 wrote to memory of 2476 2740 taskeng.exe 78 PID 2740 wrote to memory of 2476 2740 taskeng.exe 78 PID 2740 wrote to memory of 2476 2740 taskeng.exe 78 PID 2740 wrote to memory of 3036 2740 taskeng.exe 79 PID 2740 wrote to memory of 3036 2740 taskeng.exe 79 PID 2740 wrote to memory of 3036 2740 taskeng.exe 79 PID 2740 wrote to memory of 1768 2740 taskeng.exe 80 PID 2740 wrote to memory of 1768 2740 taskeng.exe 80 PID 2740 wrote to memory of 1768 2740 taskeng.exe 80 PID 2740 wrote to memory of 2776 2740 taskeng.exe 81 PID 2740 wrote to memory of 2776 2740 taskeng.exe 81 PID 2740 wrote to memory of 2776 2740 taskeng.exe 81 PID 2740 wrote to memory of 1852 2740 taskeng.exe 82 PID 2740 wrote to memory of 1852 2740 taskeng.exe 82 PID 2740 wrote to memory of 1852 2740 taskeng.exe 82 PID 2740 wrote to memory of 496 2740 taskeng.exe 83 PID 2740 wrote to memory of 496 2740 taskeng.exe 83 PID 2740 wrote to memory of 496 2740 taskeng.exe 83 PID 2740 wrote to memory of 2300 2740 taskeng.exe 84 PID 2740 wrote to memory of 2300 2740 taskeng.exe 84 PID 2740 wrote to memory of 2300 2740 taskeng.exe 84 PID 2740 wrote to memory of 1748 2740 taskeng.exe 85 PID 2740 wrote to memory of 1748 2740 taskeng.exe 85 PID 2740 wrote to memory of 1748 2740 taskeng.exe 85 PID 2740 wrote to memory of 860 2740 taskeng.exe 86 PID 2740 wrote to memory of 860 2740 taskeng.exe 86 PID 2740 wrote to memory of 860 2740 taskeng.exe 86 PID 2740 wrote to memory of 2012 2740 taskeng.exe 87 PID 2740 wrote to memory of 2012 2740 taskeng.exe 87 PID 2740 wrote to memory of 2012 2740 taskeng.exe 87 PID 2740 wrote to memory of 2804 2740 taskeng.exe 88 PID 2740 wrote to memory of 2804 2740 taskeng.exe 88 PID 2740 wrote to memory of 2804 2740 taskeng.exe 88 PID 2740 wrote to memory of 3068 2740 taskeng.exe 89 PID 2740 wrote to memory of 3068 2740 taskeng.exe 89 PID 2740 wrote to memory of 3068 2740 taskeng.exe 89 PID 2740 wrote to memory of 2572 2740 taskeng.exe 90 PID 2740 wrote to memory of 2572 2740 taskeng.exe 90 PID 2740 wrote to memory of 2572 2740 taskeng.exe 90 PID 2740 wrote to memory of 2280 2740 taskeng.exe 91 PID 2740 wrote to memory of 2280 2740 taskeng.exe 91 PID 2740 wrote to memory of 2280 2740 taskeng.exe 91 PID 2740 wrote to memory of 1772 2740 taskeng.exe 92 PID 2740 wrote to memory of 1772 2740 taskeng.exe 92 PID 2740 wrote to memory of 1772 2740 taskeng.exe 92 PID 2740 wrote to memory of 2348 2740 taskeng.exe 93 PID 2740 wrote to memory of 2348 2740 taskeng.exe 93 PID 2740 wrote to memory of 2348 2740 taskeng.exe 93 PID 2740 wrote to memory of 2984 2740 taskeng.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\EXECUTOR METEOR .exe"C:\Users\Admin\AppData\Local\Temp\EXECUTOR METEOR .exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\comReviewrefPerf\Elw8H.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\comReviewrefPerf\8WD994.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\comReviewrefPerf\surrogateRuntime.exe"C:\comReviewrefPerf\surrogateRuntime.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\schemas\conhost.exe"C:\Windows\schemas\conhost.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Windows\schemas\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\schemas\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Windows\schemas\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\comReviewrefPerf\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\comReviewrefPerf\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\comReviewrefPerf\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\comReviewrefPerf\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\comReviewrefPerf\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\comReviewrefPerf\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Windows\PCHEALTH\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\PCHEALTH\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Windows\PCHEALTH\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Windows\Vss\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\Vss\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 8 /tr "'C:\Windows\Vss\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\comReviewrefPerf\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\comReviewrefPerf\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\comReviewrefPerf\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Internet Explorer\es-ES\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\es-ES\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Internet Explorer\es-ES\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Photo Viewer\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Photo Viewer\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\comReviewrefPerf\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\comReviewrefPerf\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\comReviewrefPerf\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1004
-
C:\Windows\system32\taskeng.exetaskeng.exe {D6CEB2F3-4E96-4CB3-AE93-BACE4C27F6D4} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe"C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Program Files\Internet Explorer\es-ES\csrss.exe"C:\Program Files\Internet Explorer\es-ES\csrss.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exeC:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exeC:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Program Files (x86)\Windows Photo Viewer\cmd.exe"C:\Program Files (x86)\Windows Photo Viewer\cmd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Windows\Vss\OSPPSVC.exeC:\Windows\Vss\OSPPSVC.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:496
-
-
C:\comReviewrefPerf\services.exeC:\comReviewrefPerf\services.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Program Files\Internet Explorer\es-ES\csrss.exe"C:\Program Files\Internet Explorer\es-ES\csrss.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe"C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Windows\schemas\conhost.exeC:\Windows\schemas\conhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exeC:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\comReviewrefPerf\smss.exeC:\comReviewrefPerf\smss.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dwm.exeC:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dwm.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\PCHEALTH\winlogon.exeC:\Windows\PCHEALTH\winlogon.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Program Files\Internet Explorer\es-ES\csrss.exe"C:\Program Files\Internet Explorer\es-ES\csrss.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe"C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exeC:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\Vss\OSPPSVC.exeC:\Windows\Vss\OSPPSVC.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
C:\Program Files (x86)\Windows Photo Viewer\cmd.exe"C:\Program Files (x86)\Windows Photo Viewer\cmd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exeC:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
C:\comReviewrefPerf\services.exeC:\comReviewrefPerf\services.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Program Files\Internet Explorer\es-ES\csrss.exe"C:\Program Files\Internet Explorer\es-ES\csrss.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe"C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
C:\Windows\schemas\conhost.exeC:\Windows\schemas\conhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exeC:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exeC:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Program Files (x86)\Windows Photo Viewer\cmd.exe"C:\Program Files (x86)\Windows Photo Viewer\cmd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\comReviewrefPerf\smss.exeC:\comReviewrefPerf\smss.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Windows\Vss\OSPPSVC.exeC:\Windows\Vss\OSPPSVC.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dwm.exeC:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dwm.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Program Files\Internet Explorer\es-ES\csrss.exe"C:\Program Files\Internet Explorer\es-ES\csrss.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe"C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Windows\PCHEALTH\winlogon.exeC:\Windows\PCHEALTH\winlogon.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\comReviewrefPerf\services.exeC:\comReviewrefPerf\services.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exeC:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Program Files\Internet Explorer\es-ES\csrss.exe"C:\Program Files\Internet Explorer\es-ES\csrss.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe"C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\audiodg.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\schemas\conhost.exeC:\Windows\schemas\conhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD5ff1d6e65d0b458accf2d7e9cf078f012
SHA14a7a0831b061ce2c72dfe5dbb8d3e06ef48fb9c4
SHA2562a3d5e93e6c1c94626f81d252cf9e831a94337a8fc871efa3560fbe966e35580
SHA5121888c69ad30ab13f71aee80de86aaebb04c1ee7b08bc4f8f5e41dc325399cdc1c3bb956d9401ea6c51b425305d2835fffcae60fc4b8644fab255c03f37431d15
-
Filesize
200B
MD5a44fada9f313e0d6008aef960aeae861
SHA19217e79ff49d67baca484f5a5e9418cca3fb9b2e
SHA2561e5c949fd2059fda331f7cd178a359f2ac4d4dd8cdae76543f21493b2ffb9d44
SHA512800052e7c0cd62433bde0084b94ac3b44ddece5adc144c8e02a2e7dc8629b683ac3a94c6218bf61a595731d2dc1adf596c5bf101fc2d9c3723c3a099d2c853f7
-
Filesize
828KB
MD5422e6efd4d4c62a97c78be894b85a535
SHA16de90977b41153d67fdca7a9119edf382d7e5414
SHA256fddbbd909aeb6e9466e3c926f7773f23f84d392604a2619caa3f5a4c9d63eb8c
SHA5121c545785df5e6be6b1142adb94cc6779020d409fddd429743eb69646b35a7acafadb2445218445bbc7e5c02171f1b531d9a7c623d834c18dd49161708529d388