Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2024 09:08

General

  • Target

    65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53.exe

  • Size

    1.7MB

  • MD5

    f1c7ba434142190a707f597065fda0fc

  • SHA1

    1c2991037471e1247910ca32f4435309bf7ff7fd

  • SHA256

    65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53

  • SHA512

    9aed1b32c9d40149f41afbf88dd9757f52a52d26889b89d47defca85ea39a25c675d0a31c092657c8cfd8473f1130c8323efa9091c00eec4d733f7e29e1743eb

  • SSDEEP

    49152:j+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv0:OTHUxUoh1IF9gl23

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 42 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 14 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 8 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53.exe
    "C:\Users\Admin\AppData\Local\Temp\65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2212
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2896
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1712
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2196
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2676
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1856
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1720
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2176
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2332
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2844
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2088
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1296
    • C:\Program Files\Windows Photo Viewer\dllhost.exe
      "C:\Program Files\Windows Photo Viewer\dllhost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a5b92f49-c8c6-46a4-a70e-a0db0d92c949.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2932
        • C:\Program Files\Windows Photo Viewer\dllhost.exe
          "C:\Program Files\Windows Photo Viewer\dllhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1504
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\256ed08a-dffa-47a0-b081-5e7908479c18.vbs"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2264
            • C:\Program Files\Windows Photo Viewer\dllhost.exe
              "C:\Program Files\Windows Photo Viewer\dllhost.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2116
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3b770e92-9d9e-40f0-bbed-af66a3f90f2c.vbs"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2924
                • C:\Program Files\Windows Photo Viewer\dllhost.exe
                  "C:\Program Files\Windows Photo Viewer\dllhost.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:976
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ccd83492-f090-4b3b-bff6-f49ab0f23c26.vbs"
                    9⤵
                      PID:1816
                      • C:\Program Files\Windows Photo Viewer\dllhost.exe
                        "C:\Program Files\Windows Photo Viewer\dllhost.exe"
                        10⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:620
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0dd0b25b-2ea4-476a-86a4-2a2017ec72bc.vbs"
                          11⤵
                            PID:2876
                            • C:\Program Files\Windows Photo Viewer\dllhost.exe
                              "C:\Program Files\Windows Photo Viewer\dllhost.exe"
                              12⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1260
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ec7e4b8e-b82f-4cb5-82d4-7e434bd418bd.vbs"
                                13⤵
                                  PID:304
                                  • C:\Program Files\Windows Photo Viewer\dllhost.exe
                                    "C:\Program Files\Windows Photo Viewer\dllhost.exe"
                                    14⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2132
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\04f398ef-d68b-4a3e-96c9-f7979b4fa92d.vbs"
                                      15⤵
                                        PID:320
                                        • C:\Program Files\Windows Photo Viewer\dllhost.exe
                                          "C:\Program Files\Windows Photo Viewer\dllhost.exe"
                                          16⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1824
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3573397e-4473-4f6d-96ee-9a5dc35d6123.vbs"
                                            17⤵
                                              PID:632
                                            • C:\Windows\System32\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9195e1ed-bd42-4b1f-bc81-5637eb9be98b.vbs"
                                              17⤵
                                                PID:2076
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2939bbda-cd78-405d-a2f1-a9920364d24a.vbs"
                                            15⤵
                                              PID:2588
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\98938b39-77b9-4288-917c-d979ed42c4a5.vbs"
                                          13⤵
                                            PID:1992
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\37426025-bfea-4afa-b808-12db07b5b495.vbs"
                                        11⤵
                                          PID:1272
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d3f0a3ac-0e91-4568-99c9-9227af760856.vbs"
                                      9⤵
                                        PID:1972
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\14320672-a902-4cf2-b223-d2f7b6e45381.vbs"
                                    7⤵
                                      PID:2260
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\62c96dda-90b8-40b2-af30-ba7918b97a3d.vbs"
                                  5⤵
                                    PID:1780
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7bbace4e-8405-4806-bf40-b00f8c0af71a.vbs"
                                3⤵
                                  PID:3036
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Templates\csrss.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2940
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Templates\csrss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2936
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Templates\csrss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2828
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\wininit.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2236
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2096
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2864
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Windows\schemas\AvailableNetwork\smss.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2880
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\schemas\AvailableNetwork\smss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2848
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Windows\schemas\AvailableNetwork\smss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1048
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d536" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Desktop\65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2740
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53" /sc ONLOGON /tr "'C:\Users\Default\Desktop\65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2556
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d536" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Desktop\65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2256
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Portable Devices\wininit.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:584
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\wininit.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1312
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Portable Devices\wininit.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1632
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\Speech\Engines\SR\csrss.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2996
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Speech\Engines\SR\csrss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:708
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Windows\Speech\Engines\SR\csrss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2856
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d536" /sc MINUTE /mo 8 /tr "'C:\Program Files\Google\Chrome\Application\65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2916
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:804
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d536" /sc MINUTE /mo 13 /tr "'C:\Program Files\Google\Chrome\Application\65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1264
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1260
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1556
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2204
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\Temporary Internet Files\lsm.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2216
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temporary Internet Files\lsm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2292
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\Temporary Internet Files\lsm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2152
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\OSPPSVC.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1620
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\Admin\OSPPSVC.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2136
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\OSPPSVC.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1852
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2084
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2192
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1408
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Photo Viewer\dllhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2568
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\dllhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1784
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Photo Viewer\dllhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:692
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\spoolsv.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:620
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\spoolsv.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1860
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\spoolsv.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1236
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dwm.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2872
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1980
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:896

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\RCXCE48.tmp

                              Filesize

                              1.7MB

                              MD5

                              12e707efe2524b8230a5637b7df6f2d2

                              SHA1

                              38c360dbbb0cdd3f36073c0b72c5567c05dcf0a3

                              SHA256

                              73b009aa39dc9610b716ae6b7378427b0d40a03e2236952e482c917a5823d546

                              SHA512

                              e781fb588f485e462b8d976b96e013f284f38395dbd4a0f4a37060cef36d60467e9987e0b7995aec3bc794fda6c1fb1262824c5537ff0e34ce312a9f93e0e9a4

                            • C:\Program Files\Windows Photo Viewer\dllhost.exe

                              Filesize

                              1.7MB

                              MD5

                              3992e9a4d732712b7a1461c43bb7f6a1

                              SHA1

                              299eb4766511dad9aa081e52d5a378540558e579

                              SHA256

                              ee56cad0610ac5ad9755044c7734a4ab905d2b75c3227c5252f59f0084b95790

                              SHA512

                              537d868ba3ddadedfc9878859a952ff03f532d26d7906d60a80b1368a121f0b4a1746fefdaede4e723daa1a14a1134ec66b3deed8677674398cd60c38b669406

                            • C:\Program Files\Windows Portable Devices\wininit.exe

                              Filesize

                              1.7MB

                              MD5

                              f1c7ba434142190a707f597065fda0fc

                              SHA1

                              1c2991037471e1247910ca32f4435309bf7ff7fd

                              SHA256

                              65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53

                              SHA512

                              9aed1b32c9d40149f41afbf88dd9757f52a52d26889b89d47defca85ea39a25c675d0a31c092657c8cfd8473f1130c8323efa9091c00eec4d733f7e29e1743eb

                            • C:\Users\Admin\AppData\Local\Temp\04f398ef-d68b-4a3e-96c9-f7979b4fa92d.vbs

                              Filesize

                              725B

                              MD5

                              5fb203dec781c5fd7d374ed445336138

                              SHA1

                              e455ce4a948d4b1eef4d5335739d9756c275256f

                              SHA256

                              9dcde58a5e85736e2cc0e98b1980c1d0e38e62dcad87d00cbf1bc10a30162dec

                              SHA512

                              b25964cff0a64729cd2a3a5d4591776a12e5eaee785f170cd2cd27d33e2923fce803f48d8353acd03dd4e7c84281676a9999d5122e8e330bdb9c95da267e2d16

                            • C:\Users\Admin\AppData\Local\Temp\0dd0b25b-2ea4-476a-86a4-2a2017ec72bc.vbs

                              Filesize

                              724B

                              MD5

                              de476613f525702a6c0397e4cf00a20d

                              SHA1

                              96bff98e48865f5d0a0831d27595c46c8a33cedb

                              SHA256

                              c51ef6b92529f467815c43250aeaa22e36435716722111adda422de34ee4a5e1

                              SHA512

                              9b9e71a4e42b3cd15bfab1734ce9e5f612bfcd64389b3214bba923f67cea2a7dd428ccd7bcc70e31581103974df670343ab3c7ec93b4e30b478718a2c4b3daf3

                            • C:\Users\Admin\AppData\Local\Temp\256ed08a-dffa-47a0-b081-5e7908479c18.vbs

                              Filesize

                              725B

                              MD5

                              cc3e8a83baaa74749b8b288635f0bfd2

                              SHA1

                              714eecd774925324106fe2757001905bc613dc52

                              SHA256

                              6247252bad5dc8ef1e06eefc8a3d5cfa33b4360689c745c81640f736d5c3a98d

                              SHA512

                              4205e62fdecbcd4e222230d4c9f6ff238d22fa3c839c303c53fe549389379852849443996f7366eeedf04b43acd7c8141e4e430e2b64856f2a2a7cf33cacfcfa

                            • C:\Users\Admin\AppData\Local\Temp\3573397e-4473-4f6d-96ee-9a5dc35d6123.vbs

                              Filesize

                              725B

                              MD5

                              0e90eb07a29736670cb38e7bf65d9777

                              SHA1

                              eaf14097a1e89f98cbcbcc55ceef2f4d51945d34

                              SHA256

                              49dc5e937f66fd8effe356eac92452924f05d48749ce3e28db8afabfa277167a

                              SHA512

                              c0b8f33fc34194596f1f902299e536be3c4767c876f94c66303e6111becb6dbb6381893509aac45b5c868e16297fc0c0dd7c53801432f39b9dda2f5a8da4c9d8

                            • C:\Users\Admin\AppData\Local\Temp\3b770e92-9d9e-40f0-bbed-af66a3f90f2c.vbs

                              Filesize

                              725B

                              MD5

                              9b52bc73a2823eacb6826f1c5c22cc0d

                              SHA1

                              26eb97bc9a4e6d81d570a39e1251b2d1ea82a0af

                              SHA256

                              885e21aa3a97f960a2f901e3dc9af80a9f455321e9004f8e04707502e88a6593

                              SHA512

                              9a46b552b632a522ebc013cf6fe818150c6232f0f4f5ebdbfcb9386c5a6fa57f771ec5f1c309ccbee10472eb3235184a66a1e26e654992dcc916ab45fb445d51

                            • C:\Users\Admin\AppData\Local\Temp\7bbace4e-8405-4806-bf40-b00f8c0af71a.vbs

                              Filesize

                              501B

                              MD5

                              7ee1d706d92a68be7750872c61351da0

                              SHA1

                              0030c9a6730e01c2fc4194c695c1c463a73d9d78

                              SHA256

                              2d0b3262e16256978b23b7aff6367fa019cef0318cd9524b39ed4e57fe4be938

                              SHA512

                              3a5da1530e34f4ef42b3726e86cdd72ce4892024ac07f68dcb0b5fda8b469c75f3235d8f6a23005db11e01a66e33d1269fd3eb5cd79f64984cef608996311e93

                            • C:\Users\Admin\AppData\Local\Temp\a5b92f49-c8c6-46a4-a70e-a0db0d92c949.vbs

                              Filesize

                              725B

                              MD5

                              f9f33d88d14768368dfd185204b32f3e

                              SHA1

                              d98980e0275effaa6cd6a1f69e779a1c090cbdd6

                              SHA256

                              8b3cbd30cbfaf33c1c5f4932e44df5eb859b1dcf28b335544d509228a3b7bf85

                              SHA512

                              ddef1ed1e8c7937819d3ad329609d144e3dc75f465e58477f4add6cfaa311160ba739819e463880c394a22dcc93a52f6d6296bad82282ba5efaca6c5ebb1d1ed

                            • C:\Users\Admin\AppData\Local\Temp\ccd83492-f090-4b3b-bff6-f49ab0f23c26.vbs

                              Filesize

                              724B

                              MD5

                              d7470250041aee58eca2d81bd749ea0d

                              SHA1

                              7b24782dce47bcbdfe52252e3fee4f408ee29a0e

                              SHA256

                              974d5025d87de4044327a88bfff4feb1051429404bee486c30f15bd53a8a29ba

                              SHA512

                              4943db67a423b668f54a7b2ef736d0fc4b5a6a397dcf7cf79b279c163d69e82bf2d6a0eefdbec7965147696b9e73f2a456ce444ae90c6012a4823ecb709b8279

                            • C:\Users\Admin\AppData\Local\Temp\ec7e4b8e-b82f-4cb5-82d4-7e434bd418bd.vbs

                              Filesize

                              725B

                              MD5

                              fbef17f2dc5646937ce8029d3c4c0539

                              SHA1

                              5cc57ef1861cad6e4cf0f43d208050b759dfd89c

                              SHA256

                              20df8a19f095604df2779e1987d38722576f1d501161cb71187e6fd9dcac6897

                              SHA512

                              faedf01d9578709d73f554065a3d3b796f1798abc3f4d8c5e7fcff864b00848643338bf42fb327c9b0f29540c82ad13362f977e5b55f901bc4a4f676617d7c22

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                              Filesize

                              7KB

                              MD5

                              6548d6bcf62306ff003c922c629cfce1

                              SHA1

                              836193b330ca9e60fc0e5fb4b8f00099821a25d6

                              SHA256

                              50acb2914f9fe36c44c3e787dd3ab23ff1bf006770f5615122f38bf966940bbc

                              SHA512

                              2e40552ff61e491e59f56de65d3d7ca79e75f86506763693723e0c975741ebf2960097ab7c5a7c0b9302f3480869b0d075a2687aea1978e1d8e7e6e24ee22cf6

                            • C:\Users\Admin\OSPPSVC.exe

                              Filesize

                              1.7MB

                              MD5

                              ce09b547a30b6a628a78aeeeadcf0655

                              SHA1

                              200789e1fcbca5e719a31b8a4c6246282ec88c38

                              SHA256

                              d3a3e75b98dced45955326e50e660eddded64166f9096ad282cfaa127f5e86fe

                              SHA512

                              17ba6304136a17576bce5b5d373195b87abdac7a68d54bf41215ef1ada31071ab33727d98de12fe3c538c12cb14dadf750af01b95468e65c70f261709fb3ccf6

                            • C:\Users\Default\Desktop\65ede29c9eb1fb5cfcd274327beaad80642ed10468b478d9c291bdde4c849d53.exe

                              Filesize

                              1.7MB

                              MD5

                              a59a7cba6a2e9d08e1bd799ae2fef10f

                              SHA1

                              805b5f9e9022204a3d106d29cd6a70c61175cd2d

                              SHA256

                              ae7e73feb90e7f1c807a810006f1cdc4ec1c23d3d1e0e969396716f3708b11b4

                              SHA512

                              40262a6cf8403a2d11b08188c09639eb5ffa3c15ea18ccefa270b07468c8278e4ed977c878d09f84c69ca2ee8cef854bc9764fd979ad7f1df950774be79cf6a3

                            • C:\Windows\Speech\Engines\SR\csrss.exe

                              Filesize

                              1.7MB

                              MD5

                              58b1750903677a940e49ebe09d949fe0

                              SHA1

                              be1654e76b4d6439c44015f05df953c7575535a2

                              SHA256

                              60d9f1093862aba4b370d767f233e840907bbdd6ae8c97b26473fdd1d78b4470

                              SHA512

                              7d74407832033ebef2969125aac6818a53b286878d80963f248d00a23528149bd7f9813437aa421892537e0fc3a7c9616bfacd75a3012e63e8ef623040676018

                            • memory/620-331-0x0000000000F50000-0x0000000001110000-memory.dmp

                              Filesize

                              1.8MB

                            • memory/620-332-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                              Filesize

                              72KB

                            • memory/976-319-0x0000000000DA0000-0x0000000000F60000-memory.dmp

                              Filesize

                              1.8MB

                            • memory/1220-13-0x0000000000690000-0x000000000069A000-memory.dmp

                              Filesize

                              40KB

                            • memory/1220-5-0x00000000003F0000-0x0000000000400000-memory.dmp

                              Filesize

                              64KB

                            • memory/1220-17-0x0000000000C90000-0x0000000000C9C000-memory.dmp

                              Filesize

                              48KB

                            • memory/1220-16-0x0000000000740000-0x000000000074C000-memory.dmp

                              Filesize

                              48KB

                            • memory/1220-177-0x000007FEF5AB3000-0x000007FEF5AB4000-memory.dmp

                              Filesize

                              4KB

                            • memory/1220-15-0x0000000000730000-0x0000000000738000-memory.dmp

                              Filesize

                              32KB

                            • memory/1220-201-0x000007FEF5AB0000-0x000007FEF649C000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/1220-14-0x0000000000720000-0x000000000072E000-memory.dmp

                              Filesize

                              56KB

                            • memory/1220-216-0x000007FEF5AB0000-0x000007FEF649C000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/1220-1-0x0000000000CA0000-0x0000000000E60000-memory.dmp

                              Filesize

                              1.8MB

                            • memory/1220-2-0x000007FEF5AB0000-0x000007FEF649C000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/1220-249-0x000007FEF5AB0000-0x000007FEF649C000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/1220-3-0x00000000003C0000-0x00000000003DC000-memory.dmp

                              Filesize

                              112KB

                            • memory/1220-0-0x000007FEF5AB3000-0x000007FEF5AB4000-memory.dmp

                              Filesize

                              4KB

                            • memory/1220-12-0x0000000000500000-0x000000000050C000-memory.dmp

                              Filesize

                              48KB

                            • memory/1220-4-0x00000000003E0000-0x00000000003E8000-memory.dmp

                              Filesize

                              32KB

                            • memory/1220-11-0x00000000004D0000-0x00000000004E2000-memory.dmp

                              Filesize

                              72KB

                            • memory/1220-18-0x000007FEF5AB0000-0x000007FEF649C000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/1220-9-0x00000000004C0000-0x00000000004C8000-memory.dmp

                              Filesize

                              32KB

                            • memory/1220-8-0x00000000004B0000-0x00000000004BC000-memory.dmp

                              Filesize

                              48KB

                            • memory/1220-6-0x0000000000490000-0x00000000004A6000-memory.dmp

                              Filesize

                              88KB

                            • memory/1220-7-0x0000000000400000-0x0000000000410000-memory.dmp

                              Filesize

                              64KB

                            • memory/1260-344-0x00000000011C0000-0x0000000001380000-memory.dmp

                              Filesize

                              1.8MB

                            • memory/1504-295-0x0000000000D80000-0x0000000000F40000-memory.dmp

                              Filesize

                              1.8MB

                            • memory/1712-241-0x000000001B700000-0x000000001B9E2000-memory.dmp

                              Filesize

                              2.9MB

                            • memory/1824-368-0x0000000000FE0000-0x00000000011A0000-memory.dmp

                              Filesize

                              1.8MB

                            • memory/2064-248-0x0000000000070000-0x0000000000230000-memory.dmp

                              Filesize

                              1.8MB

                            • memory/2116-307-0x00000000002E0000-0x00000000002F2000-memory.dmp

                              Filesize

                              72KB

                            • memory/2132-356-0x00000000003C0000-0x0000000000580000-memory.dmp

                              Filesize

                              1.8MB

                            • memory/2844-247-0x0000000002080000-0x0000000002088000-memory.dmp

                              Filesize

                              32KB