Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
2308c316e3567e559662ddb17c1639ef790641693d3f570fa040d09746f5eba9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2308c316e3567e559662ddb17c1639ef790641693d3f570fa040d09746f5eba9.exe
Resource
win10v2004-20241007-en
General
-
Target
2308c316e3567e559662ddb17c1639ef790641693d3f570fa040d09746f5eba9.exe
-
Size
1.9MB
-
MD5
8fdbd9a0a9390964373271dd09b991ba
-
SHA1
78a4d4c43b894a8227b25be8f61f7aa6b8315ab7
-
SHA256
2308c316e3567e559662ddb17c1639ef790641693d3f570fa040d09746f5eba9
-
SHA512
76a6e750adc8c888bea717bdbb74dad5fe10c1688e1e87a9cb9dfb7caf4e4c5cdd9b9f34ef5aa7577f92bf1349797b04a5edac64c772489cd316d5e71ea9291c
-
SSDEEP
49152:IBJeP7Q9KggbDv7jsn3JzB6lR6jA+knZY5U:yQPihgvs3JzB6lR6jA+k5
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Microsoft.NET\\MoUsoCoreWorker.exe\"" Reviewperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Microsoft.NET\\MoUsoCoreWorker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\"" Reviewperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Microsoft.NET\\MoUsoCoreWorker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\", \"C:\\Program Files\\WindowsPowerShell\\Modules\\Registry.exe\"" Reviewperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Microsoft.NET\\MoUsoCoreWorker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\", \"C:\\Program Files\\WindowsPowerShell\\Modules\\Registry.exe\", \"C:\\Program Files\\Windows Security\\BrowserCore\\sysmon.exe\"" Reviewperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Microsoft.NET\\MoUsoCoreWorker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\", \"C:\\Program Files\\WindowsPowerShell\\Modules\\Registry.exe\", \"C:\\Program Files\\Windows Security\\BrowserCore\\sysmon.exe\", \"C:\\Recovery\\WindowsRE\\sppsvc.exe\"" Reviewperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Microsoft.NET\\MoUsoCoreWorker.exe\", \"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\", \"C:\\Program Files\\WindowsPowerShell\\Modules\\Registry.exe\", \"C:\\Program Files\\Windows Security\\BrowserCore\\sysmon.exe\", \"C:\\Recovery\\WindowsRE\\sppsvc.exe\", \"C:\\FontCommonsvc\\Reviewperf.exe\"" Reviewperf.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 64 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4196 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5080 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4076 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4016 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 644 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4300 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2400 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1588 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 752 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3172 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2360 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3616 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4448 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4164 3956 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4660 3956 schtasks.exe 88 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 2308c316e3567e559662ddb17c1639ef790641693d3f570fa040d09746f5eba9.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Reviewperf.exe -
Executes dropped EXE 2 IoCs
pid Process 2056 Reviewperf.exe 4112 MoUsoCoreWorker.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Program Files\\WindowsPowerShell\\Modules\\Registry.exe\"" Reviewperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Program Files\\WindowsPowerShell\\Modules\\Registry.exe\"" Reviewperf.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Program Files\\Windows Security\\BrowserCore\\sysmon.exe\"" Reviewperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Program Files\\Windows Security\\BrowserCore\\sysmon.exe\"" Reviewperf.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Recovery\\WindowsRE\\sppsvc.exe\"" Reviewperf.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Reviewperf = "\"C:\\FontCommonsvc\\Reviewperf.exe\"" Reviewperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MoUsoCoreWorker = "\"C:\\Windows\\Microsoft.NET\\MoUsoCoreWorker.exe\"" Reviewperf.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\"" Reviewperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\"" Reviewperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Recovery\\WindowsRE\\sppsvc.exe\"" Reviewperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Reviewperf = "\"C:\\FontCommonsvc\\Reviewperf.exe\"" Reviewperf.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MoUsoCoreWorker = "\"C:\\Windows\\Microsoft.NET\\MoUsoCoreWorker.exe\"" Reviewperf.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC8E1F2A1AF7684DF6845F12B868852F7E.TMP csc.exe File created \??\c:\Windows\System32\xqt5sk.exe csc.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\dwm.exe Reviewperf.exe File created C:\Program Files\7-Zip\Lang\6cb0b6c459d5d3 Reviewperf.exe File created C:\Program Files\Windows Security\BrowserCore\sysmon.exe Reviewperf.exe File created C:\Program Files\Windows Security\BrowserCore\121e5b5079f7c0 Reviewperf.exe File created C:\Program Files\WindowsPowerShell\Modules\Registry.exe Reviewperf.exe File created C:\Program Files\WindowsPowerShell\Modules\ee2ad38f3d4382 Reviewperf.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\MoUsoCoreWorker.exe Reviewperf.exe File created C:\Windows\Microsoft.NET\1f93f77a7f4778 Reviewperf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2308c316e3567e559662ddb17c1639ef790641693d3f570fa040d09746f5eba9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3584 PING.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 2308c316e3567e559662ddb17c1639ef790641693d3f570fa040d09746f5eba9.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings Reviewperf.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3584 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5080 schtasks.exe 2400 schtasks.exe 752 schtasks.exe 4164 schtasks.exe 1044 schtasks.exe 1588 schtasks.exe 2360 schtasks.exe 4076 schtasks.exe 4016 schtasks.exe 644 schtasks.exe 4300 schtasks.exe 3172 schtasks.exe 3616 schtasks.exe 3048 schtasks.exe 64 schtasks.exe 4448 schtasks.exe 4660 schtasks.exe 4196 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 2056 Reviewperf.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe 4112 MoUsoCoreWorker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2056 Reviewperf.exe Token: SeDebugPrivilege 4112 MoUsoCoreWorker.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2420 wrote to memory of 4744 2420 2308c316e3567e559662ddb17c1639ef790641693d3f570fa040d09746f5eba9.exe 83 PID 2420 wrote to memory of 4744 2420 2308c316e3567e559662ddb17c1639ef790641693d3f570fa040d09746f5eba9.exe 83 PID 2420 wrote to memory of 4744 2420 2308c316e3567e559662ddb17c1639ef790641693d3f570fa040d09746f5eba9.exe 83 PID 4744 wrote to memory of 5108 4744 WScript.exe 96 PID 4744 wrote to memory of 5108 4744 WScript.exe 96 PID 4744 wrote to memory of 5108 4744 WScript.exe 96 PID 5108 wrote to memory of 2056 5108 cmd.exe 98 PID 5108 wrote to memory of 2056 5108 cmd.exe 98 PID 2056 wrote to memory of 2668 2056 Reviewperf.exe 102 PID 2056 wrote to memory of 2668 2056 Reviewperf.exe 102 PID 2668 wrote to memory of 880 2668 csc.exe 104 PID 2668 wrote to memory of 880 2668 csc.exe 104 PID 2056 wrote to memory of 3496 2056 Reviewperf.exe 120 PID 2056 wrote to memory of 3496 2056 Reviewperf.exe 120 PID 3496 wrote to memory of 1396 3496 cmd.exe 122 PID 3496 wrote to memory of 1396 3496 cmd.exe 122 PID 3496 wrote to memory of 3584 3496 cmd.exe 123 PID 3496 wrote to memory of 3584 3496 cmd.exe 123 PID 3496 wrote to memory of 4112 3496 cmd.exe 127 PID 3496 wrote to memory of 4112 3496 cmd.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2308c316e3567e559662ddb17c1639ef790641693d3f570fa040d09746f5eba9.exe"C:\Users\Admin\AppData\Local\Temp\2308c316e3567e559662ddb17c1639ef790641693d3f570fa040d09746f5eba9.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FontCommonsvc\HyAeUGe8evX8YGRPELkMfoiMVhm6j.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\FontCommonsvc\SvhwgsASCbJysKpoNvm.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\FontCommonsvc\Reviewperf.exe"C:\FontCommonsvc/Reviewperf.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kgcw0i2q\kgcw0i2q.cmdline"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES247B.tmp" "c:\Windows\System32\CSC8E1F2A1AF7684DF6845F12B868852F7E.TMP"6⤵PID:880
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XF40ZPAh2W.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1396
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3584
-
-
C:\Windows\Microsoft.NET\MoUsoCoreWorker.exe"C:\Windows\Microsoft.NET\MoUsoCoreWorker.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 10 /tr "'C:\Windows\Microsoft.NET\MoUsoCoreWorker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:64
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorker" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 10 /tr "'C:\Windows\Microsoft.NET\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files\7-Zip\Lang\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Program Files\7-Zip\Lang\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\Program Files\WindowsPowerShell\Modules\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Modules\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Program Files\WindowsPowerShell\Modules\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Security\BrowserCore\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files\Windows Security\BrowserCore\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Security\BrowserCore\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ReviewperfR" /sc MINUTE /mo 5 /tr "'C:\FontCommonsvc\Reviewperf.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Reviewperf" /sc ONLOGON /tr "'C:\FontCommonsvc\Reviewperf.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ReviewperfR" /sc MINUTE /mo 5 /tr "'C:\FontCommonsvc\Reviewperf.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4660
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211B
MD5a9a1f7a6b92fba89e3834e2c873adfc4
SHA1772ef9dc691f442e7466668d82db391cdb82b21f
SHA256ffdb923e18a1fb4bc92a8b470a53687b1bf2d639fca4c44ee164a61b24f62665
SHA512c43befd0cd7c3e73fd4539c117819c8634c0c0dc7e89f8fc8ba657d70455aadc1cc06cdfe3a8c4277441a7d48bc260750f3ad16aaca313c09983f6b13177e365
-
Filesize
1.6MB
MD5571b27201bee78cb5f6adf331098cd85
SHA18dfb42a7283a61c48fdd0b8ef47e3da2a7f083c6
SHA256401acf64eff7490635859451768f1fb1f2b4198825b210207e0d7b5b619fb052
SHA512a3a7d3bd713b90bbda9350c71c3a08ad7e41acd943f361864a85fcd7b13165b9ccf9635a2d7fc839b2ecbd5751371edc9279f04573028f9c9b988c2cc473ccb5
-
Filesize
92B
MD57322619f7c34f49e39fd2100b8daaa0f
SHA1de93f7e7ab723964e43a45eea808f8524351cd95
SHA2569f060c6e3fd3bf28f66875ae0c59697d6eafd5b59ed86915f2da227b9177652d
SHA51269b47c3d08aad08308719a215014340e4e60cde09459f8ecb5cce0e6aca7a69d23f4d438609869d317173c6db274180ebc21ccdf8f8280bd8d11a22d3991d92e
-
Filesize
1KB
MD57752bbc1a2ab269f1ecb429f78377493
SHA13764b702018940593d5c26c9d4fc43c818cbc0b6
SHA2567de810f7b3a5b71aefc5f9544ac6a622f5f5e2445bcd65d18645712215565665
SHA5123c419285db4e41b89ece4bf77deb208fe227244c8e7b6b483764d847449d9757d9ebc4b5a967a0e470634ef9951c21185a4807437478fa30f2ce5142233462ec
-
Filesize
172B
MD57ddaf7ef7be5e48cccfab0196d9770ac
SHA10e513a61433c71968f9505bf9d00d513adf9ed35
SHA2560e5c0abb779af1947eaf98c253c48703af4687ef8aad77602bca5da0106f0de7
SHA5121ce7a39177ebd8ffae53f58631b163ae73d53ffbe1822efdb4c405a0a55e12646126e2af347991cc4c4063b0cbcb8eda59c0edce3e625d0d7de62fb12262d2c8
-
Filesize
376B
MD51226b0d89c87063bd55c815259aae840
SHA115eb9cb6603e5ec21058eafd11c9715291f50a8e
SHA2564347e1a1c76443790ea6c9b137590405a162c4f8b555775bad8453043980d5be
SHA512c1f49ff5712577b773fa6d1f627451bf7479cd707eae771dc26d522341eb99dc3ceaa588adcaae7f55a9f011caafc8bb908dc2d01eab626f43659c42e5461362
-
Filesize
235B
MD5e3f1af2109ae96685e634c163c1eccf3
SHA1540e60796e6dfc504a276a2bf4c48e3293688947
SHA256bfeec0a4c7a4dcf8215d18b377d1cc1bdfa99b33f9a19e69c669c2171c9b9055
SHA51219836ffe35f71666d3c48f68a861d4026877595e7e0bd8f3e7dd375f343a05c593011058e35cd158122458d24aab34de3adcdfc0c3599cb26f8fbaa1280bb834
-
Filesize
1KB
MD5ad61927912f86c7c9f1e72720f4ef0ef
SHA1dbb61d9d5c7310c85716fe9f445fee2151cef437
SHA256bf2696fc2183af293d74c988add5772c1c7257c2e85ae754e43cbe0e1d105a1e
SHA51233b6f9f93672bd0ecb68e553de0ce92dd6b773c62da7721c9544171df7de8b8588e9ba42e13836db5d5ffc078ca656993f8d06a857dda5a27e1d639d5a6fb3ee