Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08-12-2024 12:47

General

  • Target

    голые фотографии акима.exe

  • Size

    3.7MB

  • MD5

    934f077da68d3fda26839f06286b71e4

  • SHA1

    f805ec2e43d7518d420b94b954fd6b4e640ef64d

  • SHA256

    0e1ea55667ec6d7ed658718be1528ce3f5e5ac464113e114a96379004137787b

  • SHA512

    85e2bff55ce5aa6569d50146a3d95c611f774605fa9a8ee041cede3a928bf7585943e63aaf9eb5b14dc4d25fe6bee3e57d58c9b586653322300aaa67e87dd714

  • SSDEEP

    49152:UbA30FDlon6ZtXRUNAtf3zkDcpigc4Jp8+bF5BxiLFHqzQ6yQH2lJwtYv2:UbZ7tXyNAtf3Rigc4n58xHqzQ6TH2Lel

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 51 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 9 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs
  • System policy modification 1 TTPs 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\голые фотографии акима.exe
    "C:\Users\Admin\AppData\Local\Temp\голые фотографии акима.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\BridgehyperchainportAgent\lcZ6MvLb.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4028
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\BridgehyperchainportAgent\akmRZ8KYIwqCrue04KkAUPxFzhoyZ.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\BridgehyperchainportAgent\hyperblockDll.exe
          "C:\BridgehyperchainportAgent\hyperblockDll.exe"
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3456
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\r1A4hG3LWX.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4204
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:3496
              • C:\Program Files (x86)\Windows Photo Viewer\en-US\hyperblockDll.exe
                "C:\Program Files (x86)\Windows Photo Viewer\en-US\hyperblockDll.exe"
                6⤵
                • UAC bypass
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:576
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a6b1ecd2-6006-4c2e-a06b-f2477b615a30.vbs"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1920
                  • C:\Program Files (x86)\Windows Photo Viewer\en-US\hyperblockDll.exe
                    "C:\Program Files (x86)\Windows Photo Viewer\en-US\hyperblockDll.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3744
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8d644ace-9cc9-4875-b430-96e17195fcd2.vbs"
                  7⤵
                    PID:412
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bosx0LppM3.bat"
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3288
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      8⤵
                        PID:4412
                      • C:\Program Files (x86)\Windows Photo Viewer\en-US\hyperblockDll.exe
                        "C:\Program Files (x86)\Windows Photo Viewer\en-US\hyperblockDll.exe"
                        8⤵
                        • UAC bypass
                        • Executes dropped EXE
                        • Checks whether UAC is enabled
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        • System policy modification
                        PID:2040
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bcf475a2-40d4-4553-bde9-89b8c6188e8c.vbs"
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4880
                          • C:\Program Files (x86)\Windows Photo Viewer\en-US\hyperblockDll.exe
                            "C:\Program Files (x86)\Windows Photo Viewer\en-US\hyperblockDll.exe"
                            10⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1312
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bd35bb8b-c47e-40c5-a4d0-cd11d944b9c5.vbs"
                          9⤵
                            PID:2304
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LJAAEMog4U.bat"
                            9⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1828
                            • C:\Windows\system32\w32tm.exe
                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                              10⤵
                                PID:1632
                              • C:\Program Files (x86)\Windows Photo Viewer\en-US\hyperblockDll.exe
                                "C:\Program Files (x86)\Windows Photo Viewer\en-US\hyperblockDll.exe"
                                10⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:960
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\BridgehyperchainportAgent\file.vbs"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:3800
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\Windows\Downloaded Program Files\SppExtComObj.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4416
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\SppExtComObj.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1212
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Windows\Downloaded Program Files\SppExtComObj.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3088
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\BridgehyperchainportAgent\cmd.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1580
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\BridgehyperchainportAgent\cmd.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4652
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\BridgehyperchainportAgent\cmd.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2508
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\BridgehyperchainportAgent\lsass.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:660
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\BridgehyperchainportAgent\lsass.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4964
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\BridgehyperchainportAgent\lsass.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1264
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Links\wininit.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4896
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Admin\Links\wininit.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1808
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Links\wininit.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2888
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1092
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4788
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1532
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2000
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2504
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3276
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\CbsTemp\csrss.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3204
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\CbsTemp\csrss.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2384
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\CbsTemp\csrss.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1508
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Windows\fr-FR\explorer.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1836
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\fr-FR\explorer.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4020
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Windows\fr-FR\explorer.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2940
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 13 /tr "'C:\Windows\Migration\WTR\unsecapp.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1376
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Windows\Migration\WTR\unsecapp.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1800
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 5 /tr "'C:\Windows\Migration\WTR\unsecapp.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1248
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Windows\Tasks\wininit.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:444
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\Tasks\wininit.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1460
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Windows\Tasks\wininit.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3568
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2240
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2068
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2388
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "hyperblockDllh" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\hyperblockDll.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2232
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "hyperblockDll" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\hyperblockDll.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4548
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "hyperblockDllh" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\hyperblockDll.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4612
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Application Data\dllhost.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4656
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Admin\Application Data\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4740
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Application Data\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3876
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "hyperblockDllh" /sc MINUTE /mo 12 /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\hyperblockDll.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2328
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "hyperblockDll" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\hyperblockDll.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3080
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "hyperblockDllh" /sc MINUTE /mo 13 /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\hyperblockDll.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2704
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Windows\Containers\serviced\RuntimeBroker.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3076
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\Containers\serviced\RuntimeBroker.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1468
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Windows\Containers\serviced\RuntimeBroker.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3292
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\csrss.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4468
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\csrss.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3252
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\csrss.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1048
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\BridgehyperchainportAgent\wininit.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4004
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\BridgehyperchainportAgent\wininit.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3180
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\BridgehyperchainportAgent\wininit.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3396

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\BridgehyperchainportAgent\akmRZ8KYIwqCrue04KkAUPxFzhoyZ.bat

              Filesize

              48B

              MD5

              efb9b32455839f2f1e46065e13aeb93f

              SHA1

              cae49ccdd500a9808ac144387b15ad6ced46c036

              SHA256

              611d9c30bfabaaa6e9aee5c75025b71dca9116c45300ac325febeefe2d5b0e24

              SHA512

              351d053f36e497238add089f19e30f164c1110be7826d58e7fb71705b06a7d6d51789add692ac08af4c1e613e3f9c54789a5c8f707ad302a70bcd379645cff1c

            • C:\BridgehyperchainportAgent\file.vbs

              Filesize

              34B

              MD5

              677cc4360477c72cb0ce00406a949c61

              SHA1

              b679e8c3427f6c5fc47c8ac46cd0e56c9424de05

              SHA256

              f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b

              SHA512

              7cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a

            • C:\BridgehyperchainportAgent\hyperblockDll.exe

              Filesize

              3.4MB

              MD5

              df6d3aff42df48d0830227cae92e6bd6

              SHA1

              bf7f75fd82694b2a44098df2b28c2db35e7ea142

              SHA256

              05b5df5bc84e193fba3aa26d1b20cb81faa7b176a24a8df2238c8ed61e6e583a

              SHA512

              07163831729582397fdbdcef5d921750b2968b9d555fd0b881913ae1b283573e4efc827d0eb51552882743b541e44ff2a8dbf0d99a4e5c3f47228a4536bab64a

            • C:\BridgehyperchainportAgent\lcZ6MvLb.vbe

              Filesize

              231B

              MD5

              05a47a3e17c29bf5b8bc6949a26ccb44

              SHA1

              87e896625a30943a252a839ba3e22507422bbb04

              SHA256

              85f873ac1def74dea8180c0cce0084490505d2bc213abf34d3a95fda4b92c63f

              SHA512

              72ef9bb092cfbc824341aa0075ee594b410e9afea3a8ae40c0f1743a4cb2528005701099ef156dc0f2a2da4474809f1d5995e01d12c6ac36f0cc7ae6baf8f64b

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\hyperblockDll.exe.log

              Filesize

              1KB

              MD5

              311f1926e60b4f85bf8140299ca70235

              SHA1

              9b700a28d63b5dae143da22bf642c67f3bb0af49

              SHA256

              aaa667e50ce82f1cc798b5aacf93f14ef83632c20bea6655d66f631ce6f0c70b

              SHA512

              e58bcdcd64b52b68cf88c7e92932665a196a35b5a0b3c483179b69389553669607e443c33ffb40ec02b506ee353522e973b58292215697fc430226e79dcb7f24

            • C:\Users\Admin\AppData\Local\Temp\8d644ace-9cc9-4875-b430-96e17195fcd2.vbs

              Filesize

              519B

              MD5

              611f4272860ce9c0d123c1c802026510

              SHA1

              4a36b86b7f3e6a9a89e539ec8d60cc7ea5a7db07

              SHA256

              32001d808af41f23b7f91372ba8b73651397edb47281ae3dedd6851982c03820

              SHA512

              d34b17d85084b5a6601332a5ddff1d47fd804e014cb2c7bc6431dbfa523478fbd9b7f9812366c70968e18a992590ce44bb25121a2a8510166a620b1799c8e068

            • C:\Users\Admin\AppData\Local\Temp\LJAAEMog4U.bat

              Filesize

              232B

              MD5

              ec036db5d1c26dc16f929a2dd43623a7

              SHA1

              1f02f76ec1da51f17d3043b80d83d19777a90cd5

              SHA256

              611cb98e8100e6d67ac5a0f54d066ca13d3ec43aa871ceea875d881b688af46f

              SHA512

              e531aff97cc421658308a2680c9842871a5f2face330cbbc89e7fd51f468a79fff71963bcb75e2bcac1cefda7fc6ed76252f092d82742e05e32bebf30e9b8f0b

            • C:\Users\Admin\AppData\Local\Temp\a6b1ecd2-6006-4c2e-a06b-f2477b615a30.vbs

              Filesize

              742B

              MD5

              309d1e92d04f5c0908de2831152c1425

              SHA1

              039a31fc4a0e7d61f3774b6da9a6113b98b269a8

              SHA256

              4a697a18865a7fb83f028dbda96716fd0a988258b7bde3ff8cc735498596371d

              SHA512

              36b37c115dbbab57ed100fe463c1022e90fbc56e5c41e09a7d1165cbf64273640c983d7c721b10082873885e0d293ee3c88d9689e9816fe10abef0a2a447cccc

            • C:\Users\Admin\AppData\Local\Temp\bcf475a2-40d4-4553-bde9-89b8c6188e8c.vbs

              Filesize

              743B

              MD5

              c9ee6f0b0870dd277e0bfe55a58438e5

              SHA1

              3a498da47d6491bdefac5489ffb43741d0166a37

              SHA256

              7ef3fe5cef023becb0c946cf75efa2b070875db7f512a953c1b8bcbcd13cf507

              SHA512

              aad63d4b21a816e9745ec3a0a75bc6f8d00b240caafb865dc0e744c5748494e02bd4f61e3502e8deaa5b550f3e95fd691cda7adb1995d70dd2888b7286ec480e

            • C:\Users\Admin\AppData\Local\Temp\bosx0LppM3.bat

              Filesize

              232B

              MD5

              bfb2bbfe4b979a02ffd1fb36aedd6276

              SHA1

              120f379dc4a397be287f0ead857ad909f96b3fb6

              SHA256

              6d21cfaaab25ff47038c8ec28517523e6d21b016e1964e981bda37f583ffc3c2

              SHA512

              e7c7d96ee690cde04eb56d84c1041f6c647655bb02ccf65ad6f80d4b616db272e8a9b15615f8ee640a16cc6c09d7ebc09e359fa444e968f56527bc349f4a839f

            • C:\Users\Admin\AppData\Local\Temp\r1A4hG3LWX.bat

              Filesize

              232B

              MD5

              ffa7bb937da07fa3e3a625f703e288a7

              SHA1

              d653aea3ed4f8b68454ceb6ea3c832cd91477d03

              SHA256

              86d5e411af5ffba8628672cb10fd61cf10483bd6e09b19b42e686d334ec9ca40

              SHA512

              2228828958d2a6d8ff02d075c43cd5e88ae56c9d32dfe9e1302969f1bea378a0cb47176e283bb00e77ecff1ffa2a0be6f6b17de912546918503a44f3795f3431

            • memory/2040-115-0x0000000003280000-0x0000000003292000-memory.dmp

              Filesize

              72KB

            • memory/3456-34-0x000000001BF10000-0x000000001BF18000-memory.dmp

              Filesize

              32KB

            • memory/3456-42-0x000000001BFA0000-0x000000001BFAC000-memory.dmp

              Filesize

              48KB

            • memory/3456-24-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

              Filesize

              64KB

            • memory/3456-25-0x0000000002BF0000-0x0000000002C06000-memory.dmp

              Filesize

              88KB

            • memory/3456-26-0x0000000002C10000-0x0000000002C18000-memory.dmp

              Filesize

              32KB

            • memory/3456-27-0x0000000002C30000-0x0000000002C42000-memory.dmp

              Filesize

              72KB

            • memory/3456-28-0x0000000002C20000-0x0000000002C2C000-memory.dmp

              Filesize

              48KB

            • memory/3456-29-0x0000000002C40000-0x0000000002C48000-memory.dmp

              Filesize

              32KB

            • memory/3456-30-0x0000000002C50000-0x0000000002C60000-memory.dmp

              Filesize

              64KB

            • memory/3456-31-0x000000001B790000-0x000000001B79A000-memory.dmp

              Filesize

              40KB

            • memory/3456-32-0x000000001BEB0000-0x000000001BF06000-memory.dmp

              Filesize

              344KB

            • memory/3456-33-0x000000001BF00000-0x000000001BF0C000-memory.dmp

              Filesize

              48KB

            • memory/3456-23-0x0000000002BD0000-0x0000000002BD8000-memory.dmp

              Filesize

              32KB

            • memory/3456-35-0x000000001BF20000-0x000000001BF2C000-memory.dmp

              Filesize

              48KB

            • memory/3456-36-0x000000001BF30000-0x000000001BF38000-memory.dmp

              Filesize

              32KB

            • memory/3456-37-0x000000001BF40000-0x000000001BF52000-memory.dmp

              Filesize

              72KB

            • memory/3456-38-0x000000001C4A0000-0x000000001C9C8000-memory.dmp

              Filesize

              5.2MB

            • memory/3456-39-0x000000001BF70000-0x000000001BF7C000-memory.dmp

              Filesize

              48KB

            • memory/3456-40-0x000000001BF80000-0x000000001BF8C000-memory.dmp

              Filesize

              48KB

            • memory/3456-22-0x000000001B740000-0x000000001B790000-memory.dmp

              Filesize

              320KB

            • memory/3456-41-0x000000001BF90000-0x000000001BF98000-memory.dmp

              Filesize

              32KB

            • memory/3456-43-0x000000001BFB0000-0x000000001BFBC000-memory.dmp

              Filesize

              48KB

            • memory/3456-45-0x000000001C1D0000-0x000000001C1DC000-memory.dmp

              Filesize

              48KB

            • memory/3456-44-0x000000001C1C0000-0x000000001C1C8000-memory.dmp

              Filesize

              32KB

            • memory/3456-49-0x000000001C210000-0x000000001C21E000-memory.dmp

              Filesize

              56KB

            • memory/3456-48-0x000000001C200000-0x000000001C208000-memory.dmp

              Filesize

              32KB

            • memory/3456-47-0x000000001C1F0000-0x000000001C1FE000-memory.dmp

              Filesize

              56KB

            • memory/3456-46-0x000000001C1E0000-0x000000001C1EA000-memory.dmp

              Filesize

              40KB

            • memory/3456-50-0x000000001C220000-0x000000001C228000-memory.dmp

              Filesize

              32KB

            • memory/3456-51-0x000000001C230000-0x000000001C23C000-memory.dmp

              Filesize

              48KB

            • memory/3456-21-0x0000000002BB0000-0x0000000002BCC000-memory.dmp

              Filesize

              112KB

            • memory/3456-20-0x0000000002BA0000-0x0000000002BA8000-memory.dmp

              Filesize

              32KB

            • memory/3456-19-0x0000000002B90000-0x0000000002B9E000-memory.dmp

              Filesize

              56KB

            • memory/3456-18-0x0000000002B70000-0x0000000002B7E000-memory.dmp

              Filesize

              56KB

            • memory/3456-17-0x0000000000680000-0x00000000009EA000-memory.dmp

              Filesize

              3.4MB

            • memory/3456-52-0x000000001C240000-0x000000001C248000-memory.dmp

              Filesize

              32KB

            • memory/3456-53-0x000000001C350000-0x000000001C35A000-memory.dmp

              Filesize

              40KB

            • memory/3456-54-0x000000001C250000-0x000000001C25C000-memory.dmp

              Filesize

              48KB