Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 09:15
Behavioral task
behavioral1
Sample
56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe
Resource
win10v2004-20241007-en
General
-
Target
56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe
-
Size
1.2MB
-
MD5
7cc28a958fbc5de59e50e489eb3e6d00
-
SHA1
76d044eee4b1592f868078837c29888b7f8daf28
-
SHA256
56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795
-
SHA512
f6d952c2d2dfe54f291886196f46878a7268a91512ecdcc09cfccfc5fbe06d25fd353e3ef36de13d6b47f98a129a30e2466a49cdcb3d9d946e5bf8be349455fc
-
SSDEEP
24576:pw21qwzs2PGLze66eAUr9tkTSY3kuii5nRO6d:pwYNVeFPkT0uii5n4U
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\", \"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\winlogon.exe\", \"C:\\Recovery\\WindowsRE\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\fontdrvhost.exe\", \"C:\\Windows\\PrintDialog\\microsoft.system.package.metadata\\lsass.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\upfc.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\winlogon.exe\", \"C:\\Users\\Default User\\TextInputHost.exe\", \"C:\\Program Files\\Windows Multimedia Platform\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\OfficeClickToRun.exe\", \"C:\\Users\\All Users\\Oracle\\Java\\dllhost.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\", \"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\", \"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\winlogon.exe\", \"C:\\Recovery\\WindowsRE\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\fontdrvhost.exe\", \"C:\\Windows\\PrintDialog\\microsoft.system.package.metadata\\lsass.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\upfc.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\winlogon.exe\", \"C:\\Users\\Default User\\TextInputHost.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\", \"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\", \"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\winlogon.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\", \"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\winlogon.exe\", \"C:\\Recovery\\WindowsRE\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\fontdrvhost.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\", \"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\winlogon.exe\", \"C:\\Recovery\\WindowsRE\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\fontdrvhost.exe\", \"C:\\Windows\\PrintDialog\\microsoft.system.package.metadata\\lsass.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\", \"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\winlogon.exe\", \"C:\\Recovery\\WindowsRE\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\fontdrvhost.exe\", \"C:\\Windows\\PrintDialog\\microsoft.system.package.metadata\\lsass.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\upfc.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\", \"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\winlogon.exe\", \"C:\\Recovery\\WindowsRE\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\fontdrvhost.exe\", \"C:\\Windows\\PrintDialog\\microsoft.system.package.metadata\\lsass.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\upfc.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\winlogon.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\", \"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\winlogon.exe\", \"C:\\Recovery\\WindowsRE\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\fontdrvhost.exe\", \"C:\\Windows\\PrintDialog\\microsoft.system.package.metadata\\lsass.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\upfc.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\winlogon.exe\", \"C:\\Users\\Default User\\TextInputHost.exe\", \"C:\\Program Files\\Windows Multimedia Platform\\lsass.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\", \"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\winlogon.exe\", \"C:\\Recovery\\WindowsRE\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\fontdrvhost.exe\", \"C:\\Windows\\PrintDialog\\microsoft.system.package.metadata\\lsass.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\upfc.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\winlogon.exe\", \"C:\\Users\\Default User\\TextInputHost.exe\", \"C:\\Program Files\\Windows Multimedia Platform\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\OfficeClickToRun.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\", \"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\winlogon.exe\", \"C:\\Recovery\\WindowsRE\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\All Users\\lsass.exe\", \"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\winlogon.exe\", \"C:\\Recovery\\WindowsRE\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\fontdrvhost.exe\", \"C:\\Windows\\PrintDialog\\microsoft.system.package.metadata\\lsass.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\upfc.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\winlogon.exe\", \"C:\\Users\\Default User\\TextInputHost.exe\", \"C:\\Program Files\\Windows Multimedia Platform\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\OfficeClickToRun.exe\", \"C:\\Users\\All Users\\Oracle\\Java\\dllhost.exe\", \"C:\\Program Files\\Uninstall Information\\spoolsv.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe -
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1176 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1124 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4920 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3928 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2580 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4220 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4980 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2576 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1912 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4600 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 372 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4716 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 436 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 832 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1000 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3596 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4692 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4168 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4876 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4492 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4924 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4400 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1596 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 920 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4952 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3640 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4896 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4576 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3376 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 560 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3164 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4528 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1872 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4700 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4632 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1012 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5084 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1604 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 968 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4880 1944 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4456 1944 schtasks.exe 83 -
resource yara_rule behavioral2/memory/224-1-0x00000000001B0000-0x00000000002F0000-memory.dmp dcrat behavioral2/files/0x000a000000023b89-17.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe -
Executes dropped EXE 1 IoCs
pid Process 1544 spoolsv.exe -
Adds Run key to start application 2 TTPs 34 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Recovery\\WindowsRE\\taskhostw.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\Windows Defender\\de-DE\\winlogon.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\WindowsRE\\dllhost.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\PrintDialog\\microsoft.system.package.metadata\\lsass.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\OfficeClickToRun.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795 = "\"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\fontdrvhost.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\upfc.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\winlogon.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\upfc.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files\\Windows Multimedia Platform\\lsass.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\All Users\\Oracle\\Java\\dllhost.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\WindowsRE\\dllhost.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795 = "\"C:\\Recovery\\WindowsRE\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795 = "\"C:\\Recovery\\WindowsRE\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\fontdrvhost.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Users\\All Users\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\RuntimeBroker.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\PrintDialog\\microsoft.system.package.metadata\\lsass.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files\\Windows Multimedia Platform\\lsass.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\OfficeClickToRun.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\All Users\\Oracle\\Java\\dllhost.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\winlogon.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Users\\Default User\\TextInputHost.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files\\Uninstall Information\\spoolsv.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\DigitalLocker\\RuntimeBroker.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\All Users\\lsass.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\All Users\\lsass.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\Windows Defender\\de-DE\\winlogon.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795 = "\"C:\\Program Files\\7-Zip\\Lang\\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Recovery\\WindowsRE\\taskhostw.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Users\\Default User\\TextInputHost.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files\\Uninstall Information\\spoolsv.exe\"" 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\upfc.exe 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files\Uninstall Information\spoolsv.exe 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\fontdrvhost.exe 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ea1d8f6d871115 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files\7-Zip\Lang\c22e31bcc15e84 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files\Windows Defender\de-DE\winlogon.exe 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\5b884080fd4f94 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files (x86)\Windows Photo Viewer\winlogon.exe 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files (x86)\Windows Multimedia Platform\OfficeClickToRun.exe 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files (x86)\Windows Multimedia Platform\e6c9b481da804f 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files\Uninstall Information\f3b6ecef712a24 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files\7-Zip\Lang\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files (x86)\Windows Photo Viewer\cc11b995f2a76d 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files\Windows Multimedia Platform\lsass.exe 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files\Windows Multimedia Platform\6203df4a6bafc7 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Program Files\Windows Defender\de-DE\cc11b995f2a76d 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\PrintDialog\microsoft.system.package.metadata\6203df4a6bafc7 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Windows\DigitalLocker\RuntimeBroker.exe 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File opened for modification C:\Windows\DigitalLocker\RuntimeBroker.exe 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Windows\DigitalLocker\9e8d7a4ca61bd9 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe File created C:\Windows\PrintDialog\microsoft.system.package.metadata\lsass.exe 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4528 schtasks.exe 4600 schtasks.exe 436 schtasks.exe 832 schtasks.exe 4924 schtasks.exe 760 schtasks.exe 4952 schtasks.exe 1780 schtasks.exe 4492 schtasks.exe 4896 schtasks.exe 968 schtasks.exe 4880 schtasks.exe 560 schtasks.exe 1872 schtasks.exe 3928 schtasks.exe 4716 schtasks.exe 1000 schtasks.exe 4400 schtasks.exe 1596 schtasks.exe 3376 schtasks.exe 4700 schtasks.exe 4632 schtasks.exe 1012 schtasks.exe 1912 schtasks.exe 2116 schtasks.exe 2760 schtasks.exe 4876 schtasks.exe 2988 schtasks.exe 2748 schtasks.exe 4456 schtasks.exe 4220 schtasks.exe 8 schtasks.exe 2168 schtasks.exe 4692 schtasks.exe 2712 schtasks.exe 3164 schtasks.exe 5084 schtasks.exe 1124 schtasks.exe 2580 schtasks.exe 3596 schtasks.exe 4168 schtasks.exe 2996 schtasks.exe 4576 schtasks.exe 4920 schtasks.exe 3640 schtasks.exe 1176 schtasks.exe 4980 schtasks.exe 2576 schtasks.exe 372 schtasks.exe 920 schtasks.exe 1604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 1544 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe Token: SeDebugPrivilege 1544 spoolsv.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 224 wrote to memory of 2336 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 135 PID 224 wrote to memory of 2336 224 56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe 135 PID 2336 wrote to memory of 3420 2336 cmd.exe 137 PID 2336 wrote to memory of 3420 2336 cmd.exe 137 PID 2336 wrote to memory of 1544 2336 cmd.exe 144 PID 2336 wrote to memory of 1544 2336 cmd.exe 144 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe"C:\Users\Admin\AppData\Local\Temp\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LyyHDc2uuV.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3420
-
-
C:\Program Files\Uninstall Information\spoolsv.exe"C:\Program Files\Uninstall Information\spoolsv.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Windows\DigitalLocker\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\DigitalLocker\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Windows\DigitalLocker\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed7955" /sc MINUTE /mo 8 /tr "'C:\Program Files\7-Zip\Lang\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed7955" /sc MINUTE /mo 9 /tr "'C:\Program Files\7-Zip\Lang\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:8
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\All Users\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\All Users\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Defender\de-DE\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\de-DE\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\de-DE\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed7955" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed7955" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\56a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Windows\PrintDialog\microsoft.system.package.metadata\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\PrintDialog\microsoft.system.package.metadata\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Windows\PrintDialog\microsoft.system.package.metadata\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Photo Viewer\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\Default User\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Multimedia Platform\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Multimedia Platform\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Oracle\Java\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\All Users\Oracle\Java\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Oracle\Java\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Program Files\Uninstall Information\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files\Uninstall Information\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57cc28a958fbc5de59e50e489eb3e6d00
SHA176d044eee4b1592f868078837c29888b7f8daf28
SHA25656a7e805cd4b58f6771b5dc9bb86324657c1188ccc2cbe6f2a7698933c8ed795
SHA512f6d952c2d2dfe54f291886196f46878a7268a91512ecdcc09cfccfc5fbe06d25fd353e3ef36de13d6b47f98a129a30e2466a49cdcb3d9d946e5bf8be349455fc
-
Filesize
215B
MD563029df133b0d6d7a648f56919a4d6cb
SHA18a00732ffe60efef7b5fcf1b80fcd48f4e836b8a
SHA2566ac4b1088266af74a8b0b899546b0413b8eed61c08b20bfe42fbc8964866ac55
SHA512cf5b30319d2e89eed5d1e33af3a69b0e2a7695be9664dc1d405d73aeb652d30cd68a3e89132e337801ddc3d17d05d2313807c02a30472a6e3d8442fccc38ae1e