Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 17:40
Behavioral task
behavioral1
Sample
62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe
Resource
win10v2004-20241007-en
General
-
Target
62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe
-
Size
2.6MB
-
MD5
c48a32fe9ab79809fd6921ec76072980
-
SHA1
974d3211e7e6b8a51025eab1a172d07068c8c8c4
-
SHA256
62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960
-
SHA512
385d9cbf1604a9ffa12b762b80f23f5a47517c8f2522c745af3ce2121da72fbc37b1dd88e5ba4733dbbaefd4fdbc823b5d9ed07b3584bba75e22b0445e85584f
-
SSDEEP
49152:Z35SQwOGHHy3Gv6KelFCGDZPU542T5eYfn4jmnHwDKni5Js:ZpSQEHIKqFCGDZs54+5eYfnCMQ+i5J
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 42 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4000 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 976 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1440 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 904 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4320 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4116 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2704 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3200 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2280 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3668 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4204 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1984 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4948 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4216 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3640 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4280 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3856 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3724 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4896 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1560 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1612 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3676 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4736 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3436 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3660 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5052 4484 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4128 4484 schtasks.exe 83 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fontdrvhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" fontdrvhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" fontdrvhost.exe -
resource yara_rule behavioral2/memory/4060-1-0x0000000000AD0000-0x0000000000D78000-memory.dmp dcrat behavioral2/files/0x0007000000023ca4-29.dat dcrat behavioral2/files/0x000d000000023cc6-110.dat dcrat behavioral2/files/0x0008000000023ca8-120.dat dcrat behavioral2/files/0x0008000000023cb1-155.dat dcrat behavioral2/files/0x0009000000023cc8-202.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe -
Executes dropped EXE 1 IoCs
pid Process 4216 fontdrvhost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fontdrvhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fontdrvhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Photo Viewer\RCXEC93.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\RCXFA9A.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\sppsvc.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\RCXDC1A.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\RCXDC2A.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\RCXDE3F.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\smss.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\69ddcba757bf72 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\RCXDE2F.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\smss.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files\Windows Photo Viewer\RuntimeBroker.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\RCXF894.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\RCXFA99.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\sihost.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\66fc9ff0ee96c2 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Program Files\Windows Photo Viewer\9e8d7a4ca61bd9 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\sppsvc.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Program Files (x86)\Windows Photo Viewer\wininit.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Program Files (x86)\Windows Photo Viewer\56085415360792 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files\Windows Photo Viewer\RCXEC94.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\RCXF816.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\sihost.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\0a1fd5f707cd16 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_2019.716.2316.0_neutral_~_8wekyb3d8bbwe\csrss.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Program Files\Windows Photo Viewer\RuntimeBroker.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\wininit.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\ShellComponents\RCXF1C8.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Windows\uk-UA\OfficeClickToRun.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Windows\Containers\serviced\5940a34987c991 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Windows\uk-UA\OfficeClickToRun.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Windows\ShellComponents\RCXF1C7.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Windows\Containers\serviced\RCXF601.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Windows\ShellComponents\RuntimeBroker.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Windows\Containers\serviced\dllhost.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Windows\uk-UA\e6c9b481da804f 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Windows\ShellComponents\RuntimeBroker.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Windows\uk-UA\RCXE83A.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Windows\Containers\serviced\RCXF612.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Windows\ShellComponents\9e8d7a4ca61bd9 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File created C:\Windows\Containers\serviced\dllhost.exe 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe File opened for modification C:\Windows\uk-UA\RCXE7BC.tmp 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1920 schtasks.exe 2572 schtasks.exe 3640 schtasks.exe 2000 schtasks.exe 3060 schtasks.exe 1612 schtasks.exe 1736 schtasks.exe 3660 schtasks.exe 1440 schtasks.exe 4320 schtasks.exe 1628 schtasks.exe 3668 schtasks.exe 4204 schtasks.exe 2628 schtasks.exe 1492 schtasks.exe 4000 schtasks.exe 1560 schtasks.exe 976 schtasks.exe 3052 schtasks.exe 4948 schtasks.exe 1624 schtasks.exe 4736 schtasks.exe 3856 schtasks.exe 4896 schtasks.exe 3676 schtasks.exe 2324 schtasks.exe 4116 schtasks.exe 4280 schtasks.exe 2236 schtasks.exe 2108 schtasks.exe 2704 schtasks.exe 1744 schtasks.exe 1064 schtasks.exe 904 schtasks.exe 3200 schtasks.exe 2280 schtasks.exe 1984 schtasks.exe 4216 schtasks.exe 3724 schtasks.exe 3436 schtasks.exe 5052 schtasks.exe 4128 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4060 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe 4060 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe 4060 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe 4060 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe 4060 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe 4060 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe 4060 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe 4060 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe 4216 fontdrvhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4060 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe Token: SeDebugPrivilege 4216 fontdrvhost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4060 wrote to memory of 4216 4060 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe 131 PID 4060 wrote to memory of 4216 4060 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe 131 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fontdrvhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" fontdrvhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" fontdrvhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe"C:\Users\Admin\AppData\Local\Temp\62e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960N.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4060 -
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4216
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Windows\uk-UA\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\uk-UA\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Windows\uk-UA\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Links\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Default\Links\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Links\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Photo Viewer\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Photo Viewer\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Downloads\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Admin\Downloads\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Downloads\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Windows\ShellComponents\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\ShellComponents\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Windows\ShellComponents\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\Containers\serviced\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Containers\serviced\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Windows\Containers\serviced\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Photo Viewer\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4128
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5eb20a5c32d29352c0dbee0d6775a5eb5
SHA1de901bc6fb1cb15fbead83c884a8994436ba7703
SHA256c6507d8f146f17527d835cf85155956da79de5e7c08f6de993d161beabcb0503
SHA512714eecf118595086220e3c7dfe09974768b12b4f9299e8ddfa309811cb7f6e1281937fafe0208263303dce687023b2a034ae9f104babf089ac5e07dafc4afbe8
-
Filesize
2.6MB
MD5c48a32fe9ab79809fd6921ec76072980
SHA1974d3211e7e6b8a51025eab1a172d07068c8c8c4
SHA25662e056d86cf91f172914969927d2306e52facc801903f08f8a9a1b49cd34a960
SHA512385d9cbf1604a9ffa12b762b80f23f5a47517c8f2522c745af3ce2121da72fbc37b1dd88e5ba4733dbbaefd4fdbc823b5d9ed07b3584bba75e22b0445e85584f
-
Filesize
2.6MB
MD5f886fe23735ec9ea310b8115f39fe61f
SHA1afa151566a21b797beac810780de2a745080ce4b
SHA2563e2c8252e406de3f0811e0bdb1ce6454fbf95cc8037959acd0fa2660f984da85
SHA512450d4f97b3ef5a5b9b3c2b95ed4cdf99c8ee635717d66e83297b8c25c8dfafffb4a605e04546130725a8894bc944e14b184f25a3dda03343f120a630991cd240
-
Filesize
2.6MB
MD50b1ce6745a05ddd54699ae7686ef8c52
SHA1558a2ceea822ebc7ca39fee5ec0f04f187514c1a
SHA25626079b8538d1b235d346303811f8bee5d811c63b196997a373c2231bdec5de54
SHA512b96ccca9279e46913a164a0e0e8482bea02d175e56492e7017bc39f2e8efb8d31e19d85f92b593ca0bf9a1cf5a95d409d59d49502a1a6ab829bfaa81894b62fb
-
Filesize
2.6MB
MD5f89f086220a4e25053df0b2da0911b2d
SHA17728f1b5940c98a5fa044e5c3d9366e80778c0d0
SHA2561c909fd1561912f09fc8266a66d612facff162dadde3635b56a637da48d165fe
SHA51243da3d66b4421afc0f8006b026c21084605bf5406815886d9aacd58032c5a789c781d10b7d6561fee146f04ff674c5c44a7fa4ad68e73b633b6f303f800bfe5f