Analysis
-
max time kernel
23s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 05:26
Behavioral task
behavioral1
Sample
600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe
Resource
win10v2004-20241007-en
General
-
Target
600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe
-
Size
952KB
-
MD5
dc33393b307bd0e4092fba53020cf2b0
-
SHA1
9341b0a2c621e016142f7c78569b0321da0b85f8
-
SHA256
600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bd
-
SHA512
7b7c6a5c2d5b143ef850603fdde43e455fae8eb1913b644029779348d2247d90efd72c58e623712057051ab30107bfa8beb62dd9b3c89c0a6389b4547ad8a3af
-
SSDEEP
24576:e+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:Z8/KfRTK
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\Desktop\\sppsvc.exe\", \"C:\\Recovery\\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\\services.exe\", \"C:\\Windows\\System32\\SearchIndexer\\wininit.exe\", \"C:\\Users\\Public\\Favorites\\taskhost.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\Desktop\\sppsvc.exe\", \"C:\\Recovery\\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\\services.exe\", \"C:\\Windows\\System32\\SearchIndexer\\wininit.exe\", \"C:\\Users\\Public\\Favorites\\taskhost.exe\", \"C:\\Windows\\System32\\wbem\\fdWNet\\WmiPrvSE.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\Desktop\\sppsvc.exe\", \"C:\\Recovery\\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\\services.exe\", \"C:\\Windows\\System32\\SearchIndexer\\wininit.exe\", \"C:\\Users\\Public\\Favorites\\taskhost.exe\", \"C:\\Windows\\System32\\wbem\\fdWNet\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\csrss.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\Desktop\\sppsvc.exe\", \"C:\\Recovery\\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\\services.exe\", \"C:\\Windows\\System32\\SearchIndexer\\wininit.exe\", \"C:\\Users\\Public\\Favorites\\taskhost.exe\", \"C:\\Windows\\System32\\wbem\\fdWNet\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\csrss.exe\", \"C:\\Windows\\System32\\scext\\sppsvc.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\Desktop\\sppsvc.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\Desktop\\sppsvc.exe\", \"C:\\Recovery\\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\\services.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\Desktop\\sppsvc.exe\", \"C:\\Recovery\\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\\services.exe\", \"C:\\Windows\\System32\\SearchIndexer\\wininit.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe -
Process spawned unexpected child process 7 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 2824 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 2824 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2196 2824 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 584 2824 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 2824 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 2824 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2188 2824 schtasks.exe 30 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe -
resource yara_rule behavioral1/memory/2764-1-0x0000000000020000-0x0000000000114000-memory.dmp dcrat behavioral1/files/0x0006000000016d43-20.dat dcrat behavioral1/files/0x002d000000015d0e-42.dat dcrat behavioral1/memory/2180-113-0x00000000000E0000-0x00000000001D4000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2180 wininit.exe -
Adds Run key to start application 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\System32\\SearchIndexer\\wininit.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Users\\Public\\Favorites\\taskhost.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\System32\\wbem\\fdWNet\\WmiPrvSE.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\System32\\wbem\\fdWNet\\WmiPrvSE.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Windows\\System32\\scext\\sppsvc.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\ProgramData\\Desktop\\sppsvc.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\csrss.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Windows\\System32\\scext\\sppsvc.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\System32\\SearchIndexer\\wininit.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Users\\Public\\Favorites\\taskhost.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\csrss.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\ProgramData\\Desktop\\sppsvc.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Recovery\\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\\services.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Recovery\\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\\services.exe\"" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\System32\SearchIndexer\wininit.exe 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File created C:\Windows\System32\wbem\fdWNet\WmiPrvSE.exe 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File opened for modification C:\Windows\System32\scext\RCX81FA.tmp 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File opened for modification C:\Windows\System32\scext\RCX81FB.tmp 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File opened for modification C:\Windows\System32\scext\sppsvc.exe 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File created C:\Windows\System32\wbem\fdWNet\24dbde2999530ef5fd907494bc374d663924116c 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File created C:\Windows\System32\scext\0a1fd5f707cd16ea89afd3d6db52b2da58214a6c 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File opened for modification C:\Windows\System32\SearchIndexer\wininit.exe 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File opened for modification C:\Windows\System32\wbem\fdWNet\RCX7DF1.tmp 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File opened for modification C:\Windows\System32\wbem\fdWNet\RCX7DF2.tmp 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File opened for modification C:\Windows\System32\wbem\fdWNet\WmiPrvSE.exe 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File created C:\Windows\System32\SearchIndexer\560854153607923c4c5f107085a7db67be01f252 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File created C:\Windows\System32\scext\sppsvc.exe 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File opened for modification C:\Windows\System32\SearchIndexer\RCX79E7.tmp 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe File opened for modification C:\Windows\System32\SearchIndexer\RCX79E8.tmp 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2344 schtasks.exe 2184 schtasks.exe 2188 schtasks.exe 2664 schtasks.exe 2736 schtasks.exe 2196 schtasks.exe 584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2764 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2764 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Token: SeDebugPrivilege 2180 wininit.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2764 wrote to memory of 1844 2764 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe 39 PID 2764 wrote to memory of 1844 2764 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe 39 PID 2764 wrote to memory of 1844 2764 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe 39 PID 1844 wrote to memory of 2080 1844 cmd.exe 41 PID 1844 wrote to memory of 2080 1844 cmd.exe 41 PID 1844 wrote to memory of 2080 1844 cmd.exe 41 PID 1844 wrote to memory of 2180 1844 cmd.exe 42 PID 1844 wrote to memory of 2180 1844 cmd.exe 42 PID 1844 wrote to memory of 2180 1844 cmd.exe 42 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe"C:\Users\Admin\AppData\Local\Temp\600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bdN.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2764 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5DmxzuARGg.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2080
-
-
C:\Windows\System32\SearchIndexer\wininit.exe"C:\Windows\System32\SearchIndexer\wininit.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2180
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\ProgramData\Desktop\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\SearchIndexer\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\Public\Favorites\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\fdWNet\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\System32\scext\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2188
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
952KB
MD5361d0f1288fbc38a38ee3edf079f317c
SHA16de347dbc38c390ac7ce7d167c6853210e5a41fd
SHA256420a8c9517f18877c9c0a2500d762c4c373669ccface46d7ddcaca8e6ce15f1c
SHA51244a81161bf0e4f08970cdd3fc4890db92cabe30db3ae9cc92e610b2adb8b9dfd3866c81dba6fb1cc29a6c0936b12a9e571c0c8fe306ff5a992022d8602d4e224
-
Filesize
209B
MD53855b7ab651238aff04bb7364b79457f
SHA16ace4dc85b8b4bf237847e054f4ea8ccf11c12c4
SHA256bffa0f8fbfec3d5471ccba1b48de8440a600c71920d1e0bae1cf3aef0aa05c84
SHA5127a2b66441576aeae61d7701b614cc022516c442c28d88b19ea9687ce252e830fe6ebcf5e954280614f1655b29c023acec2c4fc4d0cc14f08ce6a86e63df0affb
-
Filesize
952KB
MD5dc33393b307bd0e4092fba53020cf2b0
SHA19341b0a2c621e016142f7c78569b0321da0b85f8
SHA256600d9427269badcbd7bb8635d82c3722b6475d0479787498811ee247cc2d53bd
SHA5127b7c6a5c2d5b143ef850603fdde43e455fae8eb1913b644029779348d2247d90efd72c58e623712057051ab30107bfa8beb62dd9b3c89c0a6389b4547ad8a3af