Resubmissions
25-11-2024 10:00
241125-l129jaxlhr 1025-11-2024 09:58
241125-lzk9ma1kg1 1025-11-2024 09:56
241125-lyt55s1kew 1025-11-2024 09:46
241125-lrsnqswral 10Analysis
-
max time kernel
1790s -
max time network
1797s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 09:56
Behavioral task
behavioral1
Sample
EXECUTOR METEOR .exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
EXECUTOR METEOR .exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
EXECUTOR METEOR .exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
EXECUTOR METEOR .exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
EXECUTOR METEOR .exe
Resource
win11-20241007-en
General
-
Target
EXECUTOR METEOR .exe
-
Size
1.1MB
-
MD5
e5be94d6e847bb7656e80201cacf67fb
-
SHA1
cc1ce69eea609b5fc9ff18f09407b934690bcff3
-
SHA256
be5c49fa94be78520ee83ed6230a80aaf0ae9dd4bb2d6053aa8f843131f2f506
-
SHA512
306c26f1e72a32c479b8d9112e2e0c5d22fd0e46b02ae5fa7ffff51191c9d79a52a2dbe7d200e0dc9cccf0919cba3693905c8b2dc6c6fc8f3d7eaf883e388100
-
SSDEEP
24576:U2G/nvxW3Ww0tiUfTyqyg1hIZ9XWp7wJO:UbA30L+ixx
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2520 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1912 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1392 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 804 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 700 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5044 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4552 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5096 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2952 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4988 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3548 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4176 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4276 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3612 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4844 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4196 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3684 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 448 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 528 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 368 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3168 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3368 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3680 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2296 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4368 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 3004 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4412 3004 schtasks.exe 86 -
resource yara_rule behavioral3/files/0x0008000000023c1a-10.dat dcrat behavioral3/memory/2780-13-0x0000000000DD0000-0x0000000000EA6000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation EXECUTOR METEOR .exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation surrogateRuntime.exe -
Executes dropped EXE 37 IoCs
pid Process 2780 surrogateRuntime.exe 3312 WmiPrvSE.exe 856 upfc.exe 2720 winlogon.exe 2308 System.exe 4736 unsecapp.exe 3264 fontdrvhost.exe 4400 upfc.exe 3036 winlogon.exe 3608 MoUsoCoreWorker.exe 2024 wininit.exe 3204 System.exe 4600 WmiPrvSE.exe 2108 surrogateRuntime.exe 1916 unsecapp.exe 4864 services.exe 5008 upfc.exe 1548 winlogon.exe 1892 fontdrvhost.exe 1688 System.exe 4492 MoUsoCoreWorker.exe 3716 upfc.exe 5048 winlogon.exe 772 unsecapp.exe 2468 wininit.exe 208 fontdrvhost.exe 1472 WmiPrvSE.exe 2496 System.exe 4852 surrogateRuntime.exe 2192 winlogon.exe 1164 upfc.exe 4596 unsecapp.exe 4976 services.exe 876 winlogon.exe 4364 MoUsoCoreWorker.exe 5016 System.exe 1544 upfc.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\27d1bcfc3c54e0 surrogateRuntime.exe File created C:\Program Files\Windows Security\upfc.exe surrogateRuntime.exe File created C:\Program Files\Windows Security\ea1d8f6d871115 surrogateRuntime.exe File created C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe surrogateRuntime.exe File created C:\Program Files (x86)\Windows Multimedia Platform\29c1c3cc0f7685 surrogateRuntime.exe File created C:\Program Files\Reference Assemblies\Microsoft\MoUsoCoreWorker.exe surrogateRuntime.exe File created C:\Program Files\Reference Assemblies\Microsoft\1f93f77a7f4778 surrogateRuntime.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe surrogateRuntime.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\it-IT\56085415360792 surrogateRuntime.exe File created C:\Windows\it-IT\wininit.exe surrogateRuntime.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXECUTOR METEOR .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings EXECUTOR METEOR .exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3680 schtasks.exe 2296 schtasks.exe 4368 schtasks.exe 5096 schtasks.exe 4988 schtasks.exe 3612 schtasks.exe 3168 schtasks.exe 5044 schtasks.exe 528 schtasks.exe 368 schtasks.exe 4196 schtasks.exe 1916 schtasks.exe 2932 schtasks.exe 2952 schtasks.exe 2324 schtasks.exe 804 schtasks.exe 1736 schtasks.exe 3684 schtasks.exe 1912 schtasks.exe 3548 schtasks.exe 4844 schtasks.exe 1392 schtasks.exe 4176 schtasks.exe 4412 schtasks.exe 3368 schtasks.exe 2512 schtasks.exe 2904 schtasks.exe 1492 schtasks.exe 448 schtasks.exe 4276 schtasks.exe 2520 schtasks.exe 700 schtasks.exe 4552 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2780 surrogateRuntime.exe 2780 surrogateRuntime.exe 2780 surrogateRuntime.exe 3312 WmiPrvSE.exe 3312 WmiPrvSE.exe 3312 WmiPrvSE.exe 3312 WmiPrvSE.exe 3312 WmiPrvSE.exe 3312 WmiPrvSE.exe 3312 WmiPrvSE.exe 3312 WmiPrvSE.exe 3312 WmiPrvSE.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3312 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2780 surrogateRuntime.exe Token: SeDebugPrivilege 3312 WmiPrvSE.exe Token: SeDebugPrivilege 856 upfc.exe Token: SeDebugPrivilege 2720 winlogon.exe Token: SeDebugPrivilege 2308 System.exe Token: SeDebugPrivilege 4736 unsecapp.exe Token: SeDebugPrivilege 3264 fontdrvhost.exe Token: SeDebugPrivilege 4400 upfc.exe Token: SeDebugPrivilege 3036 winlogon.exe Token: SeDebugPrivilege 3608 MoUsoCoreWorker.exe Token: SeDebugPrivilege 2024 wininit.exe Token: SeDebugPrivilege 3204 System.exe Token: SeDebugPrivilege 4600 WmiPrvSE.exe Token: SeDebugPrivilege 2108 surrogateRuntime.exe Token: SeDebugPrivilege 1916 unsecapp.exe Token: SeDebugPrivilege 4864 services.exe Token: SeDebugPrivilege 5008 upfc.exe Token: SeDebugPrivilege 1548 winlogon.exe Token: SeDebugPrivilege 1892 fontdrvhost.exe Token: SeDebugPrivilege 1688 System.exe Token: SeDebugPrivilege 4492 MoUsoCoreWorker.exe Token: SeDebugPrivilege 3716 upfc.exe Token: SeDebugPrivilege 5048 winlogon.exe Token: SeDebugPrivilege 772 unsecapp.exe Token: SeDebugPrivilege 2468 wininit.exe Token: SeDebugPrivilege 208 fontdrvhost.exe Token: SeDebugPrivilege 1472 WmiPrvSE.exe Token: SeDebugPrivilege 2496 System.exe Token: SeDebugPrivilege 4852 surrogateRuntime.exe Token: SeDebugPrivilege 2192 winlogon.exe Token: SeDebugPrivilege 1164 upfc.exe Token: SeDebugPrivilege 4596 unsecapp.exe Token: SeDebugPrivilege 4976 services.exe Token: SeDebugPrivilege 876 winlogon.exe Token: SeDebugPrivilege 4364 MoUsoCoreWorker.exe Token: SeDebugPrivilege 5016 System.exe Token: SeDebugPrivilege 1544 upfc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4256 4656 EXECUTOR METEOR .exe 82 PID 4656 wrote to memory of 4256 4656 EXECUTOR METEOR .exe 82 PID 4656 wrote to memory of 4256 4656 EXECUTOR METEOR .exe 82 PID 4256 wrote to memory of 672 4256 WScript.exe 90 PID 4256 wrote to memory of 672 4256 WScript.exe 90 PID 4256 wrote to memory of 672 4256 WScript.exe 90 PID 672 wrote to memory of 2780 672 cmd.exe 92 PID 672 wrote to memory of 2780 672 cmd.exe 92 PID 2780 wrote to memory of 3312 2780 surrogateRuntime.exe 126 PID 2780 wrote to memory of 3312 2780 surrogateRuntime.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\EXECUTOR METEOR .exe"C:\Users\Admin\AppData\Local\Temp\EXECUTOR METEOR .exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\comReviewrefPerf\Elw8H.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\comReviewrefPerf\8WD994.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:672 -
C:\comReviewrefPerf\surrogateRuntime.exe"C:\comReviewrefPerf\surrogateRuntime.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\SendTo\WmiPrvSE.exe"C:\Users\Admin\SendTo\WmiPrvSE.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "surrogateRuntimes" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\surrogateRuntime.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "surrogateRuntime" /sc ONLOGON /tr "'C:\Users\Default User\surrogateRuntime.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "surrogateRuntimes" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\surrogateRuntime.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\comReviewrefPerf\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\comReviewrefPerf\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\comReviewrefPerf\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\comReviewrefPerf\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\comReviewrefPerf\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\comReviewrefPerf\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\comReviewrefPerf\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\comReviewrefPerf\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\comReviewrefPerf\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 12 /tr "'C:\Program Files\Reference Assemblies\Microsoft\MoUsoCoreWorker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorker" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 10 /tr "'C:\Program Files\Reference Assemblies\Microsoft\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Windows\it-IT\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\it-IT\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Windows\it-IT\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\SendTo\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Admin\SendTo\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\SendTo\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\comReviewrefPerf\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\comReviewrefPerf\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\comReviewrefPerf\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Security\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\Windows Security\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Security\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4412
-
C:\Program Files\Windows Security\upfc.exe"C:\Program Files\Windows Security\upfc.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:856
-
C:\comReviewrefPerf\winlogon.exeC:\comReviewrefPerf\winlogon.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe"C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe"C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
C:\comReviewrefPerf\fontdrvhost.exeC:\comReviewrefPerf\fontdrvhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
C:\Program Files\Windows Security\upfc.exe"C:\Program Files\Windows Security\upfc.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
C:\comReviewrefPerf\winlogon.exeC:\comReviewrefPerf\winlogon.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
C:\Program Files\Reference Assemblies\Microsoft\MoUsoCoreWorker.exe"C:\Program Files\Reference Assemblies\Microsoft\MoUsoCoreWorker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
C:\Windows\it-IT\wininit.exeC:\Windows\it-IT\wininit.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe"C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3204
-
C:\Users\Admin\SendTo\WmiPrvSE.exeC:\Users\Admin\SendTo\WmiPrvSE.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
C:\Users\Default User\surrogateRuntime.exe"C:\Users\Default User\surrogateRuntime.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe"C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
C:\comReviewrefPerf\services.exeC:\comReviewrefPerf\services.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
C:\Program Files\Windows Security\upfc.exe"C:\Program Files\Windows Security\upfc.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
C:\comReviewrefPerf\winlogon.exeC:\comReviewrefPerf\winlogon.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
C:\comReviewrefPerf\fontdrvhost.exeC:\comReviewrefPerf\fontdrvhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe"C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
C:\Program Files\Reference Assemblies\Microsoft\MoUsoCoreWorker.exe"C:\Program Files\Reference Assemblies\Microsoft\MoUsoCoreWorker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
C:\Program Files\Windows Security\upfc.exe"C:\Program Files\Windows Security\upfc.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
C:\comReviewrefPerf\winlogon.exeC:\comReviewrefPerf\winlogon.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe"C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772
-
C:\Windows\it-IT\wininit.exeC:\Windows\it-IT\wininit.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
C:\comReviewrefPerf\fontdrvhost.exeC:\comReviewrefPerf\fontdrvhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:208
-
C:\Users\Admin\SendTo\WmiPrvSE.exeC:\Users\Admin\SendTo\WmiPrvSE.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe"C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
C:\Users\Default User\surrogateRuntime.exe"C:\Users\Default User\surrogateRuntime.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
C:\comReviewrefPerf\winlogon.exeC:\comReviewrefPerf\winlogon.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
C:\Program Files\Windows Security\upfc.exe"C:\Program Files\Windows Security\upfc.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe"C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
C:\comReviewrefPerf\services.exeC:\comReviewrefPerf\services.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
C:\comReviewrefPerf\winlogon.exeC:\comReviewrefPerf\winlogon.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:876
-
C:\Program Files\Reference Assemblies\Microsoft\MoUsoCoreWorker.exe"C:\Program Files\Reference Assemblies\Microsoft\MoUsoCoreWorker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe"C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
C:\Program Files\Windows Security\upfc.exe"C:\Program Files\Windows Security\upfc.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
1KB
MD57f3c0ae41f0d9ae10a8985a2c327b8fb
SHA1d58622bf6b5071beacf3b35bb505bde2000983e3
SHA256519fceae4d0dd4d09edd1b81bcdfa8aeab4b59eee77a4cd4b6295ce8e591a900
SHA5128a8fd17eef071f86e672cba0d8fc2cfed6118aff816100b9d7c06eb96443c04c04bc5692259c8d7ecb1563e877921939c61726605af4f969e3f586f0913ed125
-
Filesize
42B
MD5ff1d6e65d0b458accf2d7e9cf078f012
SHA14a7a0831b061ce2c72dfe5dbb8d3e06ef48fb9c4
SHA2562a3d5e93e6c1c94626f81d252cf9e831a94337a8fc871efa3560fbe966e35580
SHA5121888c69ad30ab13f71aee80de86aaebb04c1ee7b08bc4f8f5e41dc325399cdc1c3bb956d9401ea6c51b425305d2835fffcae60fc4b8644fab255c03f37431d15
-
Filesize
200B
MD5a44fada9f313e0d6008aef960aeae861
SHA19217e79ff49d67baca484f5a5e9418cca3fb9b2e
SHA2561e5c949fd2059fda331f7cd178a359f2ac4d4dd8cdae76543f21493b2ffb9d44
SHA512800052e7c0cd62433bde0084b94ac3b44ddece5adc144c8e02a2e7dc8629b683ac3a94c6218bf61a595731d2dc1adf596c5bf101fc2d9c3723c3a099d2c853f7
-
Filesize
828KB
MD5422e6efd4d4c62a97c78be894b85a535
SHA16de90977b41153d67fdca7a9119edf382d7e5414
SHA256fddbbd909aeb6e9466e3c926f7773f23f84d392604a2619caa3f5a4c9d63eb8c
SHA5121c545785df5e6be6b1142adb94cc6779020d409fddd429743eb69646b35a7acafadb2445218445bbc7e5c02171f1b531d9a7c623d834c18dd49161708529d388