Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe
Resource
win10v2004-20241007-en
General
-
Target
e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe
-
Size
1.8MB
-
MD5
382eaedc34bfc15b7e749fb8a0cff600
-
SHA1
d8729997725a187120ee95e1d6068586a13ab678
-
SHA256
e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847a
-
SHA512
f2be10566728f10a1396abf3115a01d98a5b06d18b94e84ecb6fbb012f1ad3ad588be84f09ceafa55bc9fd65a7e6763c68ca67596141c750ae54a2bebfc5c16b
-
SSDEEP
24576:nfNh6iTrBgSq+kdkpupwocpF4jGdWWfWanontd7ksYKtAwqgKchGGqGLk6kIv/D5:f3/kGAwaCYO4ngs7wg8UkcX
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files\\Mozilla Firefox\\csrss.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files\\Mozilla Firefox\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files\\Mozilla Firefox\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\", \"C:\\Windows\\ServiceProfiles\\LocalService\\Desktop\\csrss.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files\\Mozilla Firefox\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\", \"C:\\Windows\\ServiceProfiles\\LocalService\\Desktop\\csrss.exe\", \"C:\\Users\\Default User\\services.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files\\Mozilla Firefox\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\", \"C:\\Windows\\ServiceProfiles\\LocalService\\Desktop\\csrss.exe\", \"C:\\Users\\Default User\\services.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2404 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1236 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3028 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2848 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2840 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1100 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2660 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2420 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1928 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 2772 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 2772 schtasks.exe 31 -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2392 powershell.exe 2200 powershell.exe 2168 powershell.exe 2144 powershell.exe 2068 powershell.exe 2108 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 876 csrss.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Mozilla Firefox\\csrss.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\ServiceProfiles\\LocalService\\Desktop\\csrss.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Users\\Default User\\services.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Users\\Default User\\services.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Mozilla Firefox\\csrss.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\ServiceProfiles\\LocalService\\Desktop\\csrss.exe\"" e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCADAFE7CB11714333922B35E62D4CC926.TMP csc.exe File created \??\c:\Windows\System32\9w3j6e.exe csc.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Portable Devices\csrss.exe e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe File created C:\Program Files (x86)\Windows Portable Devices\886983d96e3d3e e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe File created C:\Program Files\Mozilla Firefox\csrss.exe e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe File created C:\Program Files\Mozilla Firefox\886983d96e3d3e e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\Desktop\csrss.exe e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe File created C:\Windows\ServiceProfiles\LocalService\Desktop\886983d96e3d3e e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2404 schtasks.exe 2848 schtasks.exe 2440 schtasks.exe 1044 schtasks.exe 2676 schtasks.exe 1236 schtasks.exe 2700 schtasks.exe 2832 schtasks.exe 1100 schtasks.exe 2660 schtasks.exe 2420 schtasks.exe 2612 schtasks.exe 3028 schtasks.exe 2840 schtasks.exe 1988 schtasks.exe 1928 schtasks.exe 2120 schtasks.exe 2432 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe Token: SeDebugPrivilege 2108 powershell.exe Token: SeDebugPrivilege 2144 powershell.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeDebugPrivilege 2068 powershell.exe Token: SeDebugPrivilege 2200 powershell.exe Token: SeDebugPrivilege 2392 powershell.exe Token: SeDebugPrivilege 876 csrss.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2312 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 35 PID 2732 wrote to memory of 2312 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 35 PID 2732 wrote to memory of 2312 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 35 PID 2312 wrote to memory of 2820 2312 csc.exe 37 PID 2312 wrote to memory of 2820 2312 csc.exe 37 PID 2312 wrote to memory of 2820 2312 csc.exe 37 PID 2732 wrote to memory of 2068 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 53 PID 2732 wrote to memory of 2068 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 53 PID 2732 wrote to memory of 2068 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 53 PID 2732 wrote to memory of 2108 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 54 PID 2732 wrote to memory of 2108 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 54 PID 2732 wrote to memory of 2108 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 54 PID 2732 wrote to memory of 2392 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 55 PID 2732 wrote to memory of 2392 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 55 PID 2732 wrote to memory of 2392 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 55 PID 2732 wrote to memory of 2200 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 56 PID 2732 wrote to memory of 2200 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 56 PID 2732 wrote to memory of 2200 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 56 PID 2732 wrote to memory of 2168 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 57 PID 2732 wrote to memory of 2168 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 57 PID 2732 wrote to memory of 2168 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 57 PID 2732 wrote to memory of 2144 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 58 PID 2732 wrote to memory of 2144 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 58 PID 2732 wrote to memory of 2144 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 58 PID 2732 wrote to memory of 436 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 65 PID 2732 wrote to memory of 436 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 65 PID 2732 wrote to memory of 436 2732 e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe 65 PID 436 wrote to memory of 1496 436 cmd.exe 67 PID 436 wrote to memory of 1496 436 cmd.exe 67 PID 436 wrote to memory of 1496 436 cmd.exe 67 PID 436 wrote to memory of 2060 436 cmd.exe 68 PID 436 wrote to memory of 2060 436 cmd.exe 68 PID 436 wrote to memory of 2060 436 cmd.exe 68 PID 436 wrote to memory of 876 436 cmd.exe 69 PID 436 wrote to memory of 876 436 cmd.exe 69 PID 436 wrote to memory of 876 436 cmd.exe 69 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe"C:\Users\Admin\AppData\Local\Temp\e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\25033rme\25033rme.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFD81.tmp" "c:\Windows\System32\CSCADAFE7CB11714333922B35E62D4CC926.TMP"3⤵PID:2820
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\winlogon.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Mozilla Firefox\csrss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\csrss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ServiceProfiles\LocalService\Desktop\csrss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\services.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fjdb6Ev5FT.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1496
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2060
-
-
C:\Program Files\Mozilla Firefox\csrss.exe"C:\Program Files\Mozilla Firefox\csrss.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Mozilla Firefox\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Mozilla Firefox\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Portable Devices\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Windows\ServiceProfiles\LocalService\Desktop\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\LocalService\Desktop\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Windows\ServiceProfiles\LocalService\Desktop\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default User\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aNe" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\Temp\e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aNe" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\Temp\e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847aN.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2120
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5382eaedc34bfc15b7e749fb8a0cff600
SHA1d8729997725a187120ee95e1d6068586a13ab678
SHA256e864306092df6d14c7214c505630f0df5faaa0f622331eec1dc9d3841de2847a
SHA512f2be10566728f10a1396abf3115a01d98a5b06d18b94e84ecb6fbb012f1ad3ad588be84f09ceafa55bc9fd65a7e6763c68ca67596141c750ae54a2bebfc5c16b
-
Filesize
1KB
MD5928e82d2059aceb6b93cf83ac62e9fee
SHA174baa18e5dff8d976157ed3a41fc4b3ed255ece7
SHA25664db97e1d682f172cf4d193ac66df2a8a24d0f2dce18920a4142cdd7956a41ff
SHA512ba8167cb2b733b4333f7c90b9b35bc5aae0dae7702c86df8db92705e3d62d302b27586b1dacdd3d9e970b77b170e35799c08d772023e03bebb0726f6e7730893
-
Filesize
218B
MD5a231c8806827286634271b6c3d288461
SHA13e26dcf1423b37efae6f4e7f8c1e4fe1247267db
SHA25643b489893f231e5e67d19aae67c7d7bdc10e834a432c3b1184700b6cd46b43e8
SHA512ead58949b20660ce4346c3b7a81bf1af92d87d652094b9145fc48ff9f2ffc1a3c68c40ec6f4f087a13e26669810fff17b1973bb3f4d48eb5873949fa6a8c0b4e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5bbd523e9d7ad5a0e2841101d55401c69
SHA1aa2b17d335bdef8e588aeacbd53fbc0b7d343339
SHA2569da2136119f85a947de8a13d29b5a95ebaffd11c9056f005321fa2c45578d823
SHA512970cb5896aa54ee7088329e517e3ed81a7c0954b7ee5370470424fe75647268c606eaa360308d05baf320cdfb07b431a57453378f3704763e5577617e2d4ed8a
-
Filesize
393B
MD5d8e9aebce8d9cddb9d6d73c14e93b64d
SHA1b491c41ef9e0cadcfe540b2bce70a0322c6164f4
SHA2566126e89657fea97f66fc21da298602f13441cf9bf03fd2ab2348e65c42cfee3b
SHA5125e2287203b3f82a9da1c223a049578bc5520e01f0dbeffd28899a6da0f71740aa7e034ee674512c6801388446bed3f69764520a5e25091babaef734ed11b0a19
-
Filesize
235B
MD53efdd013f5fb9c49c649842511279faa
SHA1d6a8f3d9bf4cf7272b0bab2b2765db7acd6fa42b
SHA2562d7fdfb017d1e3f00fdce5123704cefd261327b88894d5f8af17cd332f45e088
SHA512184e12e931f1a39760420e0627f3a9e84b6afa99e97dd32759604241f0b1841111230678d5bfab68e58a306b9f27b194273c343aeb1dac98c90a7197e5d2a8fa
-
Filesize
1KB
MD570046c6c63d509bb29450ef32b59dda3
SHA126802b73997ee22a7cd3d07ae77016969603cf00
SHA256dd0e7409cd9412eafdd8f881d6094fb539ad19c7a54d76043de655a00f80f5d0
SHA512d7b8d4ed84b8e1f5e416c378872bb7bc6d884341f0aa76f2c3b664f1ad0324a2d749c51718f3940d61663d152c35ba241ce0def03a002c6423a4d0957866c96f