Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 15:16
Behavioral task
behavioral1
Sample
9040D1F68050A9B2533AC7E8B59C2AA0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9040D1F68050A9B2533AC7E8B59C2AA0.exe
Resource
win10v2004-20241007-en
General
-
Target
9040D1F68050A9B2533AC7E8B59C2AA0.exe
-
Size
3.4MB
-
MD5
9040d1f68050a9b2533ac7e8b59c2aa0
-
SHA1
1b38a5284d4510423c0c4ac77066fc6eb41b9286
-
SHA256
7eb02adb15e19f6a197a641d054d24d133f6d0880afbb8ff53a6629cbc666b67
-
SHA512
e2121c2d4156af7968d3e608affc33519933a9e8c3ae6b2ad49af059e3b6cca12b1e3f36bc0283df2ae9645c199192d45f6b1e8053af6adf08724d11791a1f39
-
SSDEEP
49152:s3GMesEktOcTPuKyI1qd5i6JTnl9gs6ToWbepfutWiNFg20+5J3pS8Dzy:nuEktPuu1qbhwDoWHgt+5JZS8fy
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4092 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 820 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 536 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3460 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1860 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3784 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3772 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2392 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3404 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2388 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3548 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3544 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1560 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3160 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 404 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 984 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5060 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4808 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3892 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2100 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3116 3152 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3896 3152 schtasks.exe 85 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9040D1F68050A9B2533AC7E8B59C2AA0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9040D1F68050A9B2533AC7E8B59C2AA0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9040D1F68050A9B2533AC7E8B59C2AA0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" backgroundTaskHost.exe -
resource yara_rule behavioral2/memory/1076-1-0x0000000000670000-0x00000000009DA000-memory.dmp dcrat behavioral2/files/0x0008000000023bf0-48.dat dcrat -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 9040D1F68050A9B2533AC7E8B59C2AA0.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation backgroundTaskHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation backgroundTaskHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation backgroundTaskHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation backgroundTaskHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation backgroundTaskHost.exe -
Executes dropped EXE 5 IoCs
pid Process 680 backgroundTaskHost.exe 4228 backgroundTaskHost.exe 2264 backgroundTaskHost.exe 1148 backgroundTaskHost.exe 3164 backgroundTaskHost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA backgroundTaskHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA backgroundTaskHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9040D1F68050A9B2533AC7E8B59C2AA0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9040D1F68050A9B2533AC7E8B59C2AA0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA backgroundTaskHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 36 pastebin.com 42 pastebin.com 60 pastebin.com 13 pastebin.com 14 pastebin.com 33 pastebin.com -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\services.exe 9040D1F68050A9B2533AC7E8B59C2AA0.exe File created C:\Program Files (x86)\Windows Media Player\c5b4cb5e9653cc 9040D1F68050A9B2533AC7E8B59C2AA0.exe File created C:\Program Files\dotnet\host\fxr\7.0.16\csrss.exe 9040D1F68050A9B2533AC7E8B59C2AA0.exe File created C:\Program Files\dotnet\host\fxr\7.0.16\886983d96e3d3e 9040D1F68050A9B2533AC7E8B59C2AA0.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe 9040D1F68050A9B2533AC7E8B59C2AA0.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\eddb19405b7ce1 9040D1F68050A9B2533AC7E8B59C2AA0.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\addins\fontdrvhost.exe 9040D1F68050A9B2533AC7E8B59C2AA0.exe File created C:\Windows\addins\5b884080fd4f94 9040D1F68050A9B2533AC7E8B59C2AA0.exe File created C:\Windows\Panther\actionqueue\lsass.exe 9040D1F68050A9B2533AC7E8B59C2AA0.exe File created C:\Windows\Panther\actionqueue\6203df4a6bafc7 9040D1F68050A9B2533AC7E8B59C2AA0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings backgroundTaskHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings backgroundTaskHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings backgroundTaskHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 9040D1F68050A9B2533AC7E8B59C2AA0.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings backgroundTaskHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings backgroundTaskHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4808 schtasks.exe 3892 schtasks.exe 820 schtasks.exe 2808 schtasks.exe 3772 schtasks.exe 2392 schtasks.exe 3544 schtasks.exe 1560 schtasks.exe 3784 schtasks.exe 3404 schtasks.exe 3548 schtasks.exe 3116 schtasks.exe 4092 schtasks.exe 1684 schtasks.exe 1860 schtasks.exe 404 schtasks.exe 984 schtasks.exe 5060 schtasks.exe 536 schtasks.exe 3460 schtasks.exe 2388 schtasks.exe 3160 schtasks.exe 2100 schtasks.exe 3896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe 680 backgroundTaskHost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe Token: SeDebugPrivilege 680 backgroundTaskHost.exe Token: SeDebugPrivilege 4228 backgroundTaskHost.exe Token: SeDebugPrivilege 2264 backgroundTaskHost.exe Token: SeDebugPrivilege 1148 backgroundTaskHost.exe Token: SeDebugPrivilege 3164 backgroundTaskHost.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1760 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe 110 PID 1076 wrote to memory of 1760 1076 9040D1F68050A9B2533AC7E8B59C2AA0.exe 110 PID 1760 wrote to memory of 1172 1760 cmd.exe 112 PID 1760 wrote to memory of 1172 1760 cmd.exe 112 PID 1760 wrote to memory of 680 1760 cmd.exe 114 PID 1760 wrote to memory of 680 1760 cmd.exe 114 PID 680 wrote to memory of 4052 680 backgroundTaskHost.exe 116 PID 680 wrote to memory of 4052 680 backgroundTaskHost.exe 116 PID 680 wrote to memory of 3028 680 backgroundTaskHost.exe 117 PID 680 wrote to memory of 3028 680 backgroundTaskHost.exe 117 PID 4052 wrote to memory of 4228 4052 WScript.exe 121 PID 4052 wrote to memory of 4228 4052 WScript.exe 121 PID 4228 wrote to memory of 4544 4228 backgroundTaskHost.exe 123 PID 4228 wrote to memory of 4544 4228 backgroundTaskHost.exe 123 PID 4228 wrote to memory of 4668 4228 backgroundTaskHost.exe 124 PID 4228 wrote to memory of 4668 4228 backgroundTaskHost.exe 124 PID 4544 wrote to memory of 2264 4544 WScript.exe 126 PID 4544 wrote to memory of 2264 4544 WScript.exe 126 PID 2264 wrote to memory of 5000 2264 backgroundTaskHost.exe 128 PID 2264 wrote to memory of 5000 2264 backgroundTaskHost.exe 128 PID 2264 wrote to memory of 3668 2264 backgroundTaskHost.exe 129 PID 2264 wrote to memory of 3668 2264 backgroundTaskHost.exe 129 PID 5000 wrote to memory of 1148 5000 WScript.exe 131 PID 5000 wrote to memory of 1148 5000 WScript.exe 131 PID 1148 wrote to memory of 3844 1148 backgroundTaskHost.exe 133 PID 1148 wrote to memory of 3844 1148 backgroundTaskHost.exe 133 PID 1148 wrote to memory of 1104 1148 backgroundTaskHost.exe 134 PID 1148 wrote to memory of 1104 1148 backgroundTaskHost.exe 134 PID 3844 wrote to memory of 3164 3844 WScript.exe 148 PID 3844 wrote to memory of 3164 3844 WScript.exe 148 PID 3164 wrote to memory of 2052 3164 backgroundTaskHost.exe 150 PID 3164 wrote to memory of 2052 3164 backgroundTaskHost.exe 150 PID 3164 wrote to memory of 1572 3164 backgroundTaskHost.exe 151 PID 3164 wrote to memory of 1572 3164 backgroundTaskHost.exe 151 -
System policy modification 1 TTPs 18 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9040D1F68050A9B2533AC7E8B59C2AA0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9040D1F68050A9B2533AC7E8B59C2AA0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9040D1F68050A9B2533AC7E8B59C2AA0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" backgroundTaskHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" backgroundTaskHost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9040D1F68050A9B2533AC7E8B59C2AA0.exe"C:\Users\Admin\AppData\Local\Temp\9040D1F68050A9B2533AC7E8B59C2AA0.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1076 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\o9WJoXeSAa.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1172
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"3⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:680 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\929dbc38-b3a3-4564-9e57-df347d0f970f.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"5⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4228 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a9dfc884-90a5-46df-9eca-90e5317086bf.vbs"6⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"7⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2264 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1c472ea4-c141-40bf-a9a1-2a5c5ba3241f.vbs"8⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"9⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1148 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\348c9634-389a-4f75-ac70-e05009b07989.vbs"10⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"11⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3164 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\04ef9370-1cd5-4f33-91dc-7dd201e07181.vbs"12⤵PID:2052
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3034841a-1eb3-442a-82dc-fc011c3dc0a5.vbs"12⤵PID:1572
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7e2601a0-e406-4e37-9b56-b485a63a7986.vbs"10⤵PID:1104
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d127243a-56e1-40e4-b03c-66a3e10debbe.vbs"8⤵PID:3668
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2b4ce047-7af4-4036-b280-091d369d5932.vbs"6⤵PID:4668
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\54be16a2-7139-42c4-9c60-73a9a2af418a.vbs"4⤵PID:3028
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\dotnet\host\fxr\7.0.16\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\dotnet\host\fxr\7.0.16\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\dotnet\host\fxr\7.0.16\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Windows\addins\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\addins\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Windows\addins\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Windows\Panther\actionqueue\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\Panther\actionqueue\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Windows\Panther\actionqueue\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Media Player\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Media Player\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3896
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD549b64127208271d8f797256057d0b006
SHA1b99bd7e2b4e9ed24de47fb3341ea67660b84cca1
SHA2562a5d403a2e649d8eceef8f785eeb0f6d33888ec6bbf251b3c347e34cb32b1e77
SHA512f7c728923c893dc9bc88ad2159e0abcda41e1b40ff7e7756e6252d135ed238a2248a2662b3392449836dd1b0b580f0c866cc33e409527484fe4602e3d3f10e3e
-
Filesize
761B
MD5ee802087c28df8be013dc7b34151c372
SHA16b43dd1193e3713e89137ef568f8316105abc4a0
SHA2560557c6301cb0930258988f6a215b56d50b8cb0ec83c152b57ef1c3e1b3c20460
SHA512695b942ba4b5c273ea7facf2388c258d4c1659e6b31f6caf48b9dc346029be79f78440c50d70d0b6a247312b1ff9f73f0554532788a00a8b81a818bdc8a5afdf
-
Filesize
761B
MD597040e8113aee3db2d5a4d363143d7c2
SHA116418373bc62419b8a419b4422f72f06804e824e
SHA25619a92923f2c57742e333ad49619ec7e2e49ce6063811440372595b8008adb79f
SHA512a73ca4747726fbc73222daa469d9aeec5c9f7d4010f1bce34d3d6f7864df3c6f5f5ba5c2ba0eba1ff5dd97b400c34763a43202fdb3e018c746eab2996845dfb9
-
Filesize
761B
MD5caca77cd2ea8756708391f44bb696919
SHA19ea3998035410f1e5f882342072ef809f1c1e27e
SHA256be95d4c579856cd6f4869dc571b100dbd783232e40c7dab26577beeba7ea6b3f
SHA512bb6e019f9a198c27b6f3823156c123b2fdfafacb2e4b898dca1f9b9f1fbf2756220e392e325934dbaf7601dd360069bd6caeb77282bc425a63776f9bc4f7df05
-
Filesize
537B
MD5de79fe1a606013fb0295d69d776155b2
SHA1650b8d042a81049b180b52ad2c76af019dab4bcd
SHA256f415d76a4a1c558e3fad7a0f2ab9b018971318604a01e78651d96aa2bb9ad520
SHA512126af2a3f9a4217917082d329f18586542f0858484fae0a842c1bc0ddcaff972f78d88a86385c532373f4d4dcb155d61c5ac367fc60cf49051000cadae394b7a
-
Filesize
760B
MD5cb61d25b2c60ef0bf5bd06edf0fcd4a5
SHA1ec7e014fb9f6abb4a2bb702cb96e9d84f90453f2
SHA2562a0e67d38c2707bfeee32770fc1a7976466e26a709498298615822471a47eec7
SHA5120eee3a96a1f629b2c098a273beecbf17a4295391bdcde750df5fc34e33ad30ef2b779d37cc16641fcd2321746db81937792b3257721ed6c9be38ba764e428432
-
Filesize
761B
MD5def717afb3be4dc38da61dc76f9a14af
SHA1cd5e8edf00f657419cc50bcb7187308d98375500
SHA25657ada85d11cd74175ee5d13d2580caff045969739d0f6cf8c3d5a07a2b8a28ff
SHA512fc89d39c2b1e963692972def8cc4fa57afebb81ced08d18ff4ad41642a5bb8410ab1d65ff27963128e6db7f23ba3f210e89b020bf2a5861aa5e9bef55afcf9be
-
Filesize
250B
MD5db2ad240d502f125599643a778e3950e
SHA1856b3e2fc2bde3b5f288c85ec0287a9a1e022a23
SHA2562cf3145b15b768872a7778df721389b31a4df294c4c6002a739e9822763a462a
SHA512ef2669507cfad985dca6f26a9ea3cce6889f62f5252413d1ea233d150a6e2cbc74dea060a703fb283232fa086c1f694bc99fadc17829ada2b83193215991ae61
-
Filesize
3.4MB
MD59040d1f68050a9b2533ac7e8b59c2aa0
SHA11b38a5284d4510423c0c4ac77066fc6eb41b9286
SHA2567eb02adb15e19f6a197a641d054d24d133f6d0880afbb8ff53a6629cbc666b67
SHA512e2121c2d4156af7968d3e608affc33519933a9e8c3ae6b2ad49af059e3b6cca12b1e3f36bc0283df2ae9645c199192d45f6b1e8053af6adf08724d11791a1f39