Analysis
-
max time kernel
93s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 18:10
Behavioral task
behavioral1
Sample
44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe
Resource
win10v2004-20241007-en
General
-
Target
44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe
-
Size
2.5MB
-
MD5
b5f270ac0ab872e6dd6c1c4775e2aba0
-
SHA1
fd4c09df8d64150e250221ee1f709b7872fe67bb
-
SHA256
44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019a
-
SHA512
c8c6610d64e2f69884865f539e89d1d20ac5d1ccd63194bd1b72662136351d1f0466baa233fc7af7c423e9fb8e3083ece74007dcdb9d7e77a90cba4717afbb75
-
SSDEEP
49152:WnYLYb30luEfXmrkLbZZ0McjfzJ47720B4ZjYsYt54AjaTWXHt:WnSYovmrkLbEjrJ477KZjkX4nTWXHt
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4200 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3116 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 232 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3008 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4992 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2812 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1928 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5108 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4860 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 872 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4292 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4444 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4164 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3940 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4364 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4892 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4796 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4588 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4952 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4724 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3692 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1280 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 524 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1604 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1668 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3884 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4576 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1072 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 184 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2360 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1504 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1016 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3196 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 372 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4964 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4392 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4884 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4520 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1956 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1368 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1004 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4060 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3508 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4736 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3624 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 264 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4700 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 4808 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 332 4808 schtasks.exe 84 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe -
resource yara_rule behavioral2/memory/4872-1-0x0000000000010000-0x00000000002A2000-memory.dmp dcrat behavioral2/files/0x0007000000023c8d-28.dat dcrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe -
Executes dropped EXE 1 IoCs
pid Process 3120 StartMenuExperienceHost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" StartMenuExperienceHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA StartMenuExperienceHost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\MailContactsCalendarSync\TextInputHost.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Windows\System32\MailContactsCalendarSync\22eafd247d37c3 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\MSBuild\f3b6ecef712a24 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\55b276f4edf653 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files\Windows Photo Viewer\it-IT\RuntimeBroker.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files (x86)\Adobe\886983d96e3d3e 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\ee2ad38f3d4382 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files\dotnet\swidtag\6203df4a6bafc7 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files\Windows Photo Viewer\it-IT\9e8d7a4ca61bd9 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\smss.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files (x86)\MSBuild\spoolsv.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files (x86)\Microsoft.NET\wininit.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\69ddcba757bf72 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files\dotnet\swidtag\lsass.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File opened for modification C:\Program Files (x86)\MSBuild\spoolsv.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\StartMenuExperienceHost.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files (x86)\Microsoft.NET\56085415360792 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files (x86)\Adobe\csrss.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\Registry.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\PolicyDefinitions\wininit.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\uk-UA\explorer.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\uk-UA\7a0fd90576e088 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Windows\Cursors\fontdrvhost.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Windows\DiagTrack\Scenarios\RuntimeBroker.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Windows\PolicyDefinitions\56085415360792 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Windows\Cursors\5b884080fd4f94 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Windows\DiagTrack\Scenarios\9e8d7a4ca61bd9 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Windows\PrintDialog\microsoft.system.package.metadata\explorer.exe 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe File created C:\Windows\PrintDialog\microsoft.system.package.metadata\7a0fd90576e088 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 232 schtasks.exe 2992 schtasks.exe 4588 schtasks.exe 2640 schtasks.exe 4576 schtasks.exe 872 schtasks.exe 4292 schtasks.exe 1280 schtasks.exe 184 schtasks.exe 332 schtasks.exe 3632 schtasks.exe 1756 schtasks.exe 372 schtasks.exe 4964 schtasks.exe 2812 schtasks.exe 4364 schtasks.exe 4724 schtasks.exe 524 schtasks.exe 8 schtasks.exe 3940 schtasks.exe 4520 schtasks.exe 2112 schtasks.exe 1016 schtasks.exe 1692 schtasks.exe 2508 schtasks.exe 5052 schtasks.exe 3508 schtasks.exe 1928 schtasks.exe 4444 schtasks.exe 4164 schtasks.exe 4796 schtasks.exe 3884 schtasks.exe 1004 schtasks.exe 3116 schtasks.exe 3692 schtasks.exe 3196 schtasks.exe 3568 schtasks.exe 4200 schtasks.exe 2360 schtasks.exe 3624 schtasks.exe 4924 schtasks.exe 4380 schtasks.exe 3008 schtasks.exe 5108 schtasks.exe 1504 schtasks.exe 4884 schtasks.exe 1368 schtasks.exe 4700 schtasks.exe 3004 schtasks.exe 1604 schtasks.exe 1072 schtasks.exe 2044 schtasks.exe 264 schtasks.exe 4696 schtasks.exe 2792 schtasks.exe 760 schtasks.exe 548 schtasks.exe 4860 schtasks.exe 4952 schtasks.exe 1668 schtasks.exe 2700 schtasks.exe 1816 schtasks.exe 2276 schtasks.exe 4992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4872 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 4872 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 4872 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 4872 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 4872 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 4872 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 4872 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 4872 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 4872 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 3120 StartMenuExperienceHost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4872 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Token: SeDebugPrivilege 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Token: SeDebugPrivilege 3120 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4872 wrote to memory of 212 4872 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 112 PID 4872 wrote to memory of 212 4872 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 112 PID 212 wrote to memory of 4948 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 160 PID 212 wrote to memory of 4948 212 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe 160 PID 4948 wrote to memory of 3656 4948 cmd.exe 163 PID 4948 wrote to memory of 3656 4948 cmd.exe 163 PID 4948 wrote to memory of 3120 4948 cmd.exe 167 PID 4948 wrote to memory of 3120 4948 cmd.exe 167 -
System policy modification 1 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" StartMenuExperienceHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe"C:\Users\Admin\AppData\Local\Temp\44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe"C:\Users\Admin\AppData\Local\Temp\44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe"2⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:212 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SXqTJOrBHr.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:3656
-
-
C:\Users\All Users\StartMenuExperienceHost.exe"C:\Users\All Users\StartMenuExperienceHost.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3120
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Users\Public\Pictures\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Public\Pictures\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Pictures\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Adobe\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Adobe\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Photo Viewer\ja-JP\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\ja-JP\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Photo Viewer\ja-JP\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Default User\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Windows\PolicyDefinitions\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Windows\PolicyDefinitions\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Windows\System32\MailContactsCalendarSync\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\System32\MailContactsCalendarSync\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:4892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 13 /tr "'C:\Windows\System32\MailContactsCalendarSync\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\uk-UA\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\uk-UA\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\uk-UA\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\MSBuild\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\MSBuild\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:8
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\All Users\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Windows\Cursors\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Cursors\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Windows\Cursors\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files\dotnet\swidtag\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\dotnet\swidtag\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files\dotnet\swidtag\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:1044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Photo Viewer\it-IT\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\it-IT\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Photo Viewer\it-IT\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
PID:4392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:1956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:4060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\Public\AccountPictures\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
PID:4736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Users\Public\AccountPictures\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Windows\DiagTrack\Scenarios\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\DiagTrack\Scenarios\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:3632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Windows\DiagTrack\Scenarios\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:4924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft.NET\wininit.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:3568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\wininit.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\wininit.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:4380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Windows\PrintDialog\microsoft.system.package.metadata\explorer.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\PrintDialog\microsoft.system.package.metadata\explorer.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:5052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Windows\PrintDialog\microsoft.system.package.metadata\explorer.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:4696
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5b5f270ac0ab872e6dd6c1c4775e2aba0
SHA1fd4c09df8d64150e250221ee1f709b7872fe67bb
SHA25644b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019a
SHA512c8c6610d64e2f69884865f539e89d1d20ac5d1ccd63194bd1b72662136351d1f0466baa233fc7af7c423e9fb8e3083ece74007dcdb9d7e77a90cba4717afbb75
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe.log
Filesize1KB
MD5bbb951a34b516b66451218a3ec3b0ae1
SHA17393835a2476ae655916e0a9687eeaba3ee876e9
SHA256eb70c64ae99d14ac2588b7a84854fbf3c420532d7fe4dfd49c7b5a70c869943a
SHA51263bcbfcf8e7421c66855c487c31b2991a989bdea0c1edd4c40066b52fa3eb3d9d37db1cd21b8eb4f33dd5870cc20532c8f485eab9c0b4f6b0793a35c077f2d6f
-
Filesize
211B
MD55e352cfe1ba339a1dd8958b56dfb1988
SHA105efd15741d3895b6354043d17e0e3a4103053ec
SHA256390ccc10548cd1c160215d14ea343584f66247d0c6f191d69c11b47b459371b1
SHA51288caf28db173b21796fc78bd7e7d42e1c59d6fee4a532abcf75404bc6de649eda54356ca64c28cbd9d8a57b56a80928d46aece998baacb9e2a400e96c2a319f2