Analysis
-
max time kernel
79s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 10:38
Behavioral task
behavioral1
Sample
neverlose 3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
neverlose 3.exe
Resource
win10v2004-20241007-en
General
-
Target
neverlose 3.exe
-
Size
3.0MB
-
MD5
d85cbe8df31057755dcfb1276acbeb55
-
SHA1
dc054ac21d8f7beae6e9c439f5e5923730d14b94
-
SHA256
f60844ef3d886a602137c29b0a7f994494b3d4276d7373ee3ab138a4ccff3d58
-
SHA512
e075cfcf01eca07e9cb5963be06afd79e42a53d22dd7837858e56beb301101bf03b61d0bcddb00d3442855edad94807a0afee0acf5e165a6678cecf19f9ea99e
-
SSDEEP
49152:RbA3jHZLMGaxfSIkbO+7+KrktBibbg8LU7x/5uzMkXil:Rb4Z4Bxqg4rkvibb1Yt5u1Sl
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\", \"C:\\Users\\Admin\\PrintHood\\SearchApp.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\6.0.27\\dllhost.exe\", \"C:\\mIIccrosoft\\SearchApp.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\explorer.exe\", \"C:\\mIIccrosoft\\taskhostw.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\", \"C:\\Users\\Admin\\PrintHood\\SearchApp.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\6.0.27\\dllhost.exe\", \"C:\\mIIccrosoft\\SearchApp.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\explorer.exe\", \"C:\\mIIccrosoft\\taskhostw.exe\", \"C:\\mIIccrosoft\\conhost.exe\", \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Windows Sidebar\\Gadgets\\rundll32.exe\", \"C:\\Windows\\SysWOW64\\sppui\\backgroundTaskHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\", \"C:\\Users\\Admin\\PrintHood\\SearchApp.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\6.0.27\\dllhost.exe\", \"C:\\mIIccrosoft\\SearchApp.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\", \"C:\\Users\\Admin\\PrintHood\\SearchApp.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\", \"C:\\Users\\Admin\\PrintHood\\SearchApp.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\6.0.27\\dllhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\", \"C:\\Users\\Admin\\PrintHood\\SearchApp.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\6.0.27\\dllhost.exe\", \"C:\\mIIccrosoft\\SearchApp.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\explorer.exe\", \"C:\\mIIccrosoft\\taskhostw.exe\", \"C:\\mIIccrosoft\\conhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\", \"C:\\Users\\Admin\\PrintHood\\SearchApp.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\6.0.27\\dllhost.exe\", \"C:\\mIIccrosoft\\SearchApp.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\explorer.exe\", \"C:\\mIIccrosoft\\taskhostw.exe\", \"C:\\mIIccrosoft\\conhost.exe\", \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\RuntimeBroker.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\", \"C:\\Users\\Admin\\PrintHood\\SearchApp.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\6.0.27\\dllhost.exe\", \"C:\\mIIccrosoft\\SearchApp.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\explorer.exe\", \"C:\\mIIccrosoft\\taskhostw.exe\", \"C:\\mIIccrosoft\\conhost.exe\", \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Windows Sidebar\\Gadgets\\rundll32.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\", \"C:\\Users\\Admin\\PrintHood\\SearchApp.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\6.0.27\\dllhost.exe\", \"C:\\mIIccrosoft\\SearchApp.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\explorer.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Start Menu\\conhost.exe\", \"C:\\mIIccrosoft\\TextInputHost.exe\", \"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\", \"C:\\mIIccrosoft\\Registry.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\", \"C:\\Users\\Admin\\PrintHood\\SearchApp.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\6.0.27\\dllhost.exe\", \"C:\\mIIccrosoft\\SearchApp.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\explorer.exe\", \"C:\\mIIccrosoft\\taskhostw.exe\", \"C:\\mIIccrosoft\\conhost.exe\", \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" Winmonitordhcp.exe -
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 680 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1584 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4028 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 948 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4320 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4304 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4084 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4860 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3436 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3280 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1248 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1016 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2188 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1496 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1384 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2912 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1208 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3092 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1500 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5100 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4264 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4920 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2164 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1504 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1120 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4168 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1292 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2788 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1596 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4288 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4308 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4532 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4924 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3256 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3716 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3624 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1532 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5112 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 540 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4900 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3280 2636 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 2636 schtasks.exe 100 -
resource yara_rule behavioral2/files/0x000a000000023b7e-14.dat dcrat behavioral2/memory/4116-25-0x0000000000400000-0x0000000000701000-memory.dmp dcrat behavioral2/files/0x000a000000023b81-37.dat dcrat behavioral2/memory/4520-39-0x0000000000950000-0x0000000000BA0000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation neverlose 3.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Neverlose.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Winmonitordhcp.exe -
Executes dropped EXE 4 IoCs
pid Process 184 FakeInject .exe 2728 Neverlose.exe 4520 Winmonitordhcp.exe 2088 conhost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 34 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Users\\Admin\\Start Menu\\conhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Recovery\\WindowsRE\\services.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\mIIccrosoft\\taskhostw.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\mIIccrosoft\\conhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rundll32 = "\"C:\\Program Files (x86)\\Windows Sidebar\\Gadgets\\rundll32.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\mIIccrosoft\\Registry.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Users\\Admin\\PrintHood\\SearchApp.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\mIIccrosoft\\conhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\SysWOW64\\sppui\\backgroundTaskHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Users\\Admin\\PrintHood\\SearchApp.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FakeInject = "\"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Recovery\\WindowsRE\\services.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files\\dotnet\\host\\fxr\\6.0.27\\dllhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\mIIccrosoft\\SearchApp.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\mIIccrosoft\\SearchApp.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\RuntimeBroker.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\mIIccrosoft\\TextInputHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\it-IT\\SppExtComObj.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files\\dotnet\\host\\fxr\\6.0.27\\dllhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\explorer.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\explorer.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Users\\Admin\\Start Menu\\conhost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\mIIccrosoft\\TextInputHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FakeInject = "\"C:\\Users\\All Users\\WindowsHolographicDevices\\SpatialStore\\FakeInject .exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\RuntimeBroker.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\mIIccrosoft\\Registry.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\mIIccrosoft\\taskhostw.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rundll32 = "\"C:\\Program Files (x86)\\Windows Sidebar\\Gadgets\\rundll32.exe\"" Winmonitordhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\SysWOW64\\sppui\\backgroundTaskHost.exe\"" Winmonitordhcp.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sppui\backgroundTaskHost.exe Winmonitordhcp.exe File created C:\Windows\SysWOW64\sppui\eddb19405b7ce1 Winmonitordhcp.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\e1ef82546f0b02 Winmonitordhcp.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\55b276f4edf653 Winmonitordhcp.exe File created C:\Program Files\dotnet\host\fxr\6.0.27\dllhost.exe Winmonitordhcp.exe File created C:\Program Files\dotnet\host\fxr\6.0.27\5940a34987c991 Winmonitordhcp.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RuntimeBroker.exe Winmonitordhcp.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\9e8d7a4ca61bd9 Winmonitordhcp.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\rundll32.exe Winmonitordhcp.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\SppExtComObj.exe Winmonitordhcp.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\StartMenuExperienceHost.exe Winmonitordhcp.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\3d4d5fa006b533 Winmonitordhcp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FakeInject .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Neverlose.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neverlose 3.exe -
Checks SCSI registry key(s) 3 TTPs 36 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 PaintStudio.View.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C PaintStudio.View.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 PaintStudio.View.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 PaintStudio.View.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 PaintStudio.View.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A PaintStudio.View.exe -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\MuiCache PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheVersion = "1" PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "51200" PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheVersion = "1" PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheVersion = "1" PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings neverlose 3.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings Neverlose.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" PaintStudio.View.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4688 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1532 schtasks.exe 540 schtasks.exe 4900 schtasks.exe 1384 schtasks.exe 1500 schtasks.exe 1292 schtasks.exe 2656 schtasks.exe 4924 schtasks.exe 3256 schtasks.exe 1584 schtasks.exe 4084 schtasks.exe 4168 schtasks.exe 2788 schtasks.exe 4532 schtasks.exe 3716 schtasks.exe 2512 schtasks.exe 2940 schtasks.exe 1016 schtasks.exe 1208 schtasks.exe 2248 schtasks.exe 3624 schtasks.exe 3436 schtasks.exe 2220 schtasks.exe 2188 schtasks.exe 3092 schtasks.exe 4288 schtasks.exe 4304 schtasks.exe 1248 schtasks.exe 2164 schtasks.exe 1504 schtasks.exe 2980 schtasks.exe 4308 schtasks.exe 964 schtasks.exe 4860 schtasks.exe 1496 schtasks.exe 1936 schtasks.exe 4264 schtasks.exe 4920 schtasks.exe 5100 schtasks.exe 2620 schtasks.exe 3280 schtasks.exe 680 schtasks.exe 948 schtasks.exe 4320 schtasks.exe 3280 schtasks.exe 2912 schtasks.exe 4028 schtasks.exe 964 schtasks.exe 1120 schtasks.exe 1596 schtasks.exe 5112 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2200 PaintStudio.View.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 772 mspaint.exe 772 mspaint.exe 4520 Winmonitordhcp.exe 4520 Winmonitordhcp.exe 4520 Winmonitordhcp.exe 4520 Winmonitordhcp.exe 4520 Winmonitordhcp.exe 4520 Winmonitordhcp.exe 2088 conhost.exe 2088 conhost.exe 2088 conhost.exe 2088 conhost.exe 2088 conhost.exe 2088 conhost.exe 2088 conhost.exe 2088 conhost.exe 2088 conhost.exe 2088 conhost.exe 2088 conhost.exe 2088 conhost.exe 2088 conhost.exe 2088 conhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2200 PaintStudio.View.exe Token: SeDebugPrivilege 2200 PaintStudio.View.exe Token: SeDebugPrivilege 2200 PaintStudio.View.exe Token: SeDebugPrivilege 4520 Winmonitordhcp.exe Token: SeDebugPrivilege 2088 conhost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 772 mspaint.exe 2200 PaintStudio.View.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4116 wrote to memory of 184 4116 neverlose 3.exe 83 PID 4116 wrote to memory of 184 4116 neverlose 3.exe 83 PID 4116 wrote to memory of 184 4116 neverlose 3.exe 83 PID 4116 wrote to memory of 2728 4116 neverlose 3.exe 85 PID 4116 wrote to memory of 2728 4116 neverlose 3.exe 85 PID 4116 wrote to memory of 2728 4116 neverlose 3.exe 85 PID 4116 wrote to memory of 772 4116 neverlose 3.exe 86 PID 4116 wrote to memory of 772 4116 neverlose 3.exe 86 PID 4116 wrote to memory of 772 4116 neverlose 3.exe 86 PID 2728 wrote to memory of 2004 2728 Neverlose.exe 87 PID 2728 wrote to memory of 2004 2728 Neverlose.exe 87 PID 2728 wrote to memory of 2004 2728 Neverlose.exe 87 PID 2004 wrote to memory of 1440 2004 WScript.exe 97 PID 2004 wrote to memory of 1440 2004 WScript.exe 97 PID 2004 wrote to memory of 1440 2004 WScript.exe 97 PID 1440 wrote to memory of 4520 1440 cmd.exe 99 PID 1440 wrote to memory of 4520 1440 cmd.exe 99 PID 4520 wrote to memory of 2088 4520 Winmonitordhcp.exe 152 PID 4520 wrote to memory of 2088 4520 Winmonitordhcp.exe 152 PID 1440 wrote to memory of 4688 1440 cmd.exe 153 PID 1440 wrote to memory of 4688 1440 cmd.exe 153 PID 1440 wrote to memory of 4688 1440 cmd.exe 153 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\neverlose 3.exe"C:\Users\Admin\AppData\Local\Temp\neverlose 3.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\FakeInject .exe"C:\Users\Admin\AppData\Local\Temp\FakeInject .exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:184
-
-
C:\Users\Admin\AppData\Local\Temp\Neverlose.exe"C:\Users\Admin\AppData\Local\Temp\Neverlose.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\mIIccrosoft\VeA0JL7xlD4tfYfCo.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\mIIccrosoft\XqamRZ1Xoz1ZjGFCXqY6WSXlph.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\mIIccrosoft\Winmonitordhcp.exe"C:\mIIccrosoft\Winmonitordhcp.exe"5⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\mIIccrosoft\conhost.exe"C:\mIIccrosoft\conhost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4688
-
-
-
-
-
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\1690444292_new_preview_43-1.jpg" /ForceBootstrapPaint3D2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:772
-
-
C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe"C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe"1⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Start Menu\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Admin\Start Menu\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Start Menu\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\mIIccrosoft\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\mIIccrosoft\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 5 /tr "'C:\mIIccrosoft\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "FakeInject F" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\FakeInject .exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "FakeInject " /sc ONLOGON /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\FakeInject .exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "FakeInject F" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\FakeInject .exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\mIIccrosoft\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\mIIccrosoft\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\mIIccrosoft\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\PrintHood\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\Admin\PrintHood\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\PrintHood\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files\dotnet\host\fxr\6.0.27\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\dotnet\host\fxr\6.0.27\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files\dotnet\host\fxr\6.0.27\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 11 /tr "'C:\mIIccrosoft\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\mIIccrosoft\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 14 /tr "'C:\mIIccrosoft\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\mIIccrosoft\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\mIIccrosoft\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\mIIccrosoft\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\mIIccrosoft\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\mIIccrosoft\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\mIIccrosoft\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "rundll32r" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\rundll32.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "rundll32" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\rundll32.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "rundll32r" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\rundll32.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 9 /tr "'C:\Windows\SysWOW64\sppui\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\SysWOW64\sppui\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\Windows\SysWOW64\sppui\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:964
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json
Filesize261B
MD5fc977814aeac750ec0cb072e130666b7
SHA187d5b79bccaa5697034ebf8337c5c1097495b487
SHA2561bf04462d0c88552a6146a7bf2b79b12fc11a60ebaed145fda2d670f8aa2155b
SHA5121203ded84f14e7c15f7748cc4657ae0f11bd3ce6985a388a5224046c6598c6902b46cb51681c1ca5374028a492ba6ff5aa605cb306a685158f470fb528fb3c9b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\cloudCommunitySettings.json
Filesize2KB
MD5f4e4a03ebd0ab3a953c56a300d61d223
SHA197a9acf22c3bdd6989d7c120c21077c4d5a9a80e
SHA25652bfb22aa2d7b0ce083d312fb8fa8dcda3063207186f99fc259aebd9064cbedc
SHA51212aa71eea45720a4d7d057da0b662635671e4cd165ad2e0d30a3d2a43950b47dd60c26c1bbbe049418f815850e571b8d93e4c8b8cbbd686abc3cf7926ba719c2
-
Filesize
121KB
MD5a9617b667a8c88c1a75f16b4ba9dc13a
SHA1be96747e7260c1b9af54a90933762146801bf02a
SHA2565992eb1177745ef9881ac01cb308ba443067bc54b88b7a5c7ed16b81183fbf28
SHA512d8f38834f8e9e0647706f4f6e852831e2c9ba1b3498dc9f7c6b9e779e0645bd1a169eedf91f3d143540f77573c87d45cd90518142effd615a986f8dc9547f1f6
-
Filesize
6KB
MD5ed6243a98ea5ecfb2b08f481336b6ece
SHA1195867c38058367ef2077da167ddc039ef2b5e54
SHA256dbe8b0b17ec8f38af926975eea7d9053d0509806a442146ab98b6c681b710a59
SHA512622dd556b14205b3c0013651d2f9baa40d6623b3843dd6628ad7b83b01758d62b57da1fda6a8502ca2aadcb65f120a72ea6ca3c3ecf63d3ebec0689f8fde6365
-
Filesize
2.6MB
MD51924cb0ae8b7ccca9e8030087ecc5a94
SHA1a1f4565cb089b27fd3deacd0fd93733f8f0f4c32
SHA256ffc00ef9763576969540d6f2d16a929bad4c3ffc9f4e97cf60206f56a2a7718d
SHA51246ac86ae174c77cd3c81a63a6bce589260a4412d29d4704caa8bc4a064d62859f37fdfb2f5dea48e3c415c5db074f964af732c34b0e2e2ea56db6505124d33ad
-
Filesize
214B
MD5e955b2ec1be8959f39d773b8c8417732
SHA151a89326d1425d8b8bf9db97c2db4dc73ded184e
SHA256741f26d85e76dcba0b82c0ca409cb8222ff1a11faff2e5240f4cc5802d5fb882
SHA51297f8610cd350239ed2363b3bd1ff561daff629754536154940401d2f46080bc3660ec71fc74df25a6e0392f5e4c70d7afad031384fd373899b240801da379ea1
-
Filesize
2.3MB
MD5988542961c81da353a3dc109c65b8408
SHA1424508109934444e670a5a3565d83ffa0c7ac9ec
SHA2561f25153fef26a01656b3b31dc0e84d85a24571d06308029c13a8b2ac4977e22c
SHA512d63b8032ad1cec921e857985b73d918026d40b998b26e21d7b3fbefce3dd3dee060a5ce2e609db44894422897f25816597f0c70005bcee4f2749f7cc6a0a8091
-
Filesize
147B
MD5b6b458cde945cc0c95245c764a82eabf
SHA1d8f0ddb6bf54e07f88f12e7efa92c1709ef25463
SHA256a98a5c09761c4ec2465434b70a052e8141e16195f8aa884984da0cf41601789d
SHA512301e603aaf53f9778e799baba419318d87c5e69058c878f2fa6e76dd68e35e76b49b334c1fa46cc2754c4b339f0bcc507bdbb76294b0ff3d24685563b3ca5395