Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 10:02
Behavioral task
behavioral1
Sample
Neverlose.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Neverlose.exe
Resource
win10v2004-20241007-en
General
-
Target
Neverlose.exe
-
Size
2.6MB
-
MD5
1924cb0ae8b7ccca9e8030087ecc5a94
-
SHA1
a1f4565cb089b27fd3deacd0fd93733f8f0f4c32
-
SHA256
ffc00ef9763576969540d6f2d16a929bad4c3ffc9f4e97cf60206f56a2a7718d
-
SHA512
46ac86ae174c77cd3c81a63a6bce589260a4412d29d4704caa8bc4a064d62859f37fdfb2f5dea48e3c415c5db074f964af732c34b0e2e2ea56db6505124d33ad
-
SSDEEP
49152:ubA3jHZLMGaxfSIkbO+7+KrktBibbg8LU7x/5uzMk+:ub4Z4Bxqg4rkvibb1Yt5u1+
Malware Config
Signatures
-
DcRat 20 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Neverlose.exe 1988 schtasks.exe 2380 schtasks.exe 776 schtasks.exe 1120 schtasks.exe 2512 schtasks.exe 2704 schtasks.exe 2440 schtasks.exe 1380 schtasks.exe 1708 schtasks.exe 1200 schtasks.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\b75386f1303e64 Winmonitordhcp.exe 984 schtasks.exe 1192 schtasks.exe 2364 schtasks.exe 2460 schtasks.exe 536 schtasks.exe 2924 schtasks.exe 2384 schtasks.exe 760 schtasks.exe -
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\taskhost.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\dwm.exe\", \"C:\\Windows\\system\\csrss.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\taskhost.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\dwm.exe\", \"C:\\Windows\\system\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Defender\\en-US\\lsass.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\taskhost.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\dwm.exe\", \"C:\\Windows\\system\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Defender\\en-US\\lsass.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\dllhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\taskhost.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\dwm.exe\", \"C:\\Windows\\system\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Defender\\en-US\\lsass.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\dllhost.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\taskhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\taskhost.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\dwm.exe\"" Winmonitordhcp.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 536 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 776 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 984 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1120 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2704 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1192 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2364 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2460 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2380 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 2944 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 2944 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0007000000015d87-12.dat dcrat behavioral1/memory/2552-13-0x0000000001390000-0x00000000015E0000-memory.dmp dcrat behavioral1/memory/300-39-0x00000000012B0000-0x0000000001500000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2552 Winmonitordhcp.exe 300 lsass.exe -
Loads dropped DLL 2 IoCs
pid Process 2640 cmd.exe 2640 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\system\\csrss.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files (x86)\\Windows Defender\\en-US\\lsass.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\dllhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\taskhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\dwm.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\system\\csrss.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files (x86)\\Windows Defender\\en-US\\lsass.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\dllhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\MSOCache\\All Users\\OSPPSVC.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\MSOCache\\All Users\\OSPPSVC.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\taskhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\dwm.exe\"" Winmonitordhcp.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\taskhost.exe Winmonitordhcp.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\b75386f1303e64 Winmonitordhcp.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\dwm.exe Winmonitordhcp.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\6cb0b6c459d5d3 Winmonitordhcp.exe File created C:\Program Files (x86)\Windows Defender\en-US\lsass.exe Winmonitordhcp.exe File created C:\Program Files (x86)\Windows Defender\en-US\6203df4a6bafc7 Winmonitordhcp.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\taskhost.exe Winmonitordhcp.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\system\csrss.exe Winmonitordhcp.exe File created C:\Windows\system\886983d96e3d3e Winmonitordhcp.exe File created C:\Windows\diagnostics\lsass.exe Winmonitordhcp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Neverlose.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2092 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1200 schtasks.exe 536 schtasks.exe 2704 schtasks.exe 760 schtasks.exe 2460 schtasks.exe 776 schtasks.exe 984 schtasks.exe 1120 schtasks.exe 2512 schtasks.exe 2924 schtasks.exe 1192 schtasks.exe 2380 schtasks.exe 2384 schtasks.exe 2440 schtasks.exe 2364 schtasks.exe 1988 schtasks.exe 1708 schtasks.exe 1380 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2552 Winmonitordhcp.exe 2552 Winmonitordhcp.exe 2552 Winmonitordhcp.exe 2552 Winmonitordhcp.exe 2552 Winmonitordhcp.exe 2552 Winmonitordhcp.exe 2552 Winmonitordhcp.exe 300 lsass.exe 300 lsass.exe 300 lsass.exe 300 lsass.exe 300 lsass.exe 300 lsass.exe 300 lsass.exe 300 lsass.exe 300 lsass.exe 300 lsass.exe 300 lsass.exe 300 lsass.exe 300 lsass.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 300 lsass.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2552 Winmonitordhcp.exe Token: SeDebugPrivilege 300 lsass.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2724 3032 Neverlose.exe 30 PID 3032 wrote to memory of 2724 3032 Neverlose.exe 30 PID 3032 wrote to memory of 2724 3032 Neverlose.exe 30 PID 3032 wrote to memory of 2724 3032 Neverlose.exe 30 PID 2724 wrote to memory of 2640 2724 WScript.exe 31 PID 2724 wrote to memory of 2640 2724 WScript.exe 31 PID 2724 wrote to memory of 2640 2724 WScript.exe 31 PID 2724 wrote to memory of 2640 2724 WScript.exe 31 PID 2640 wrote to memory of 2552 2640 cmd.exe 33 PID 2640 wrote to memory of 2552 2640 cmd.exe 33 PID 2640 wrote to memory of 2552 2640 cmd.exe 33 PID 2640 wrote to memory of 2552 2640 cmd.exe 33 PID 2552 wrote to memory of 1076 2552 Winmonitordhcp.exe 53 PID 2552 wrote to memory of 1076 2552 Winmonitordhcp.exe 53 PID 2552 wrote to memory of 1076 2552 Winmonitordhcp.exe 53 PID 2640 wrote to memory of 2092 2640 cmd.exe 55 PID 2640 wrote to memory of 2092 2640 cmd.exe 55 PID 2640 wrote to memory of 2092 2640 cmd.exe 55 PID 2640 wrote to memory of 2092 2640 cmd.exe 55 PID 1076 wrote to memory of 2756 1076 cmd.exe 56 PID 1076 wrote to memory of 2756 1076 cmd.exe 56 PID 1076 wrote to memory of 2756 1076 cmd.exe 56 PID 1076 wrote to memory of 300 1076 cmd.exe 57 PID 1076 wrote to memory of 300 1076 cmd.exe 57 PID 1076 wrote to memory of 300 1076 cmd.exe 57 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Neverlose.exe"C:\Users\Admin\AppData\Local\Temp\Neverlose.exe"1⤵
- DcRat
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\mIIccrosoft\VeA0JL7xlD4tfYfCo.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\mIIccrosoft\XqamRZ1Xoz1ZjGFCXqY6WSXlph.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\mIIccrosoft\Winmonitordhcp.exe"C:\mIIccrosoft\Winmonitordhcp.exe"4⤵
- DcRat
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9WPi3mVAsM.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2756
-
-
C:\Program Files (x86)\Windows Defender\en-US\lsass.exe"C:\Program Files (x86)\Windows Defender\en-US\lsass.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2092
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\taskhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Windows\system\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\system\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Windows\system\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Defender\en-US\lsass.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\en-US\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Defender\en-US\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\OSPPSVC.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\MSOCache\All Users\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1380
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220B
MD5f6258777472aee696a604484b77aff35
SHA1efd84ee301cd969fe99a663e09f199fbf889e8df
SHA25668d9d6304d17ea6d2b074d51c097c129caa9ac014cdd90b7363f7bee5f467761
SHA5123edb8c8c1bce861c14904f4e90fbb6da25ce14f7eac8975eee9bed3406feb0e32552a357b63bb3370617049cff292d6d6cb45714fa3c7649832a49980eb51383
-
Filesize
214B
MD5e955b2ec1be8959f39d773b8c8417732
SHA151a89326d1425d8b8bf9db97c2db4dc73ded184e
SHA256741f26d85e76dcba0b82c0ca409cb8222ff1a11faff2e5240f4cc5802d5fb882
SHA51297f8610cd350239ed2363b3bd1ff561daff629754536154940401d2f46080bc3660ec71fc74df25a6e0392f5e4c70d7afad031384fd373899b240801da379ea1
-
Filesize
2.3MB
MD5988542961c81da353a3dc109c65b8408
SHA1424508109934444e670a5a3565d83ffa0c7ac9ec
SHA2561f25153fef26a01656b3b31dc0e84d85a24571d06308029c13a8b2ac4977e22c
SHA512d63b8032ad1cec921e857985b73d918026d40b998b26e21d7b3fbefce3dd3dee060a5ce2e609db44894422897f25816597f0c70005bcee4f2749f7cc6a0a8091
-
Filesize
147B
MD5b6b458cde945cc0c95245c764a82eabf
SHA1d8f0ddb6bf54e07f88f12e7efa92c1709ef25463
SHA256a98a5c09761c4ec2465434b70a052e8141e16195f8aa884984da0cf41601789d
SHA512301e603aaf53f9778e799baba419318d87c5e69058c878f2fa6e76dd68e35e76b49b334c1fa46cc2754c4b339f0bcc507bdbb76294b0ff3d24685563b3ca5395