Analysis
-
max time kernel
96s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 17:41
Static task
static1
Behavioral task
behavioral1
Sample
6689bd9a5c795eedc631e5fbb850b7ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6689bd9a5c795eedc631e5fbb850b7ff.exe
Resource
win10v2004-20241007-en
General
-
Target
6689bd9a5c795eedc631e5fbb850b7ff.exe
-
Size
1.5MB
-
MD5
6689bd9a5c795eedc631e5fbb850b7ff
-
SHA1
b63d8e25d4eb9abea3ed0f7867f70db2ab18cba2
-
SHA256
cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810b
-
SHA512
ff51ccd8918344bb0439a4d9e39394383bff2196496d778db9a3d2862479e55f1bf59c7d467ff055c721231cb592c3c7ded63c5af28a3f9552dc6421dd1151bf
-
SSDEEP
24576:K17t7ROjwJqMAVS2hEijP79eAPkavlCCyYcBoZ11q8UuZPt5PsuWg:KBt7R0wJ4L5Uw5lCCyG31oIPmg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\System.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\System.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\dllhost.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\System.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\dllhost.exe\", \"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\Download\\upfc.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\System.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\dllhost.exe\", \"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\Download\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\System.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\dllhost.exe\", \"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\Download\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\6689bd9a5c795eedc631e5fbb850b7ff.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3812 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4152 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1964 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2696 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3368 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4376 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1668 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 876 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3860 2456 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 212 2456 schtasks.exe 83 -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2708 powershell.exe 868 powershell.exe 464 powershell.exe 2940 powershell.exe 4340 powershell.exe 2180 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 6689bd9a5c795eedc631e5fbb850b7ff.exe -
Executes dropped EXE 1 IoCs
pid Process 676 System.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\Download\\upfc.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6689bd9a5c795eedc631e5fbb850b7ff = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\6689bd9a5c795eedc631e5fbb850b7ff.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Recovery\\WindowsRE\\Idle.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Recovery\\WindowsRE\\Idle.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\System.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\dllhost.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6689bd9a5c795eedc631e5fbb850b7ff = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\6689bd9a5c795eedc631e5fbb850b7ff.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\System.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\dllhost.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\Download\\upfc.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" 6689bd9a5c795eedc631e5fbb850b7ff.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCE0BC87B84AB0403483D69997202A982A.TMP csc.exe File created \??\c:\Windows\System32\ewkptm.exe csc.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\upfc.exe 6689bd9a5c795eedc631e5fbb850b7ff.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\ea1d8f6d871115 6689bd9a5c795eedc631e5fbb850b7ff.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\dllhost.exe 6689bd9a5c795eedc631e5fbb850b7ff.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\5940a34987c991 6689bd9a5c795eedc631e5fbb850b7ff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 6689bd9a5c795eedc631e5fbb850b7ff.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 880 schtasks.exe 3032 schtasks.exe 3812 schtasks.exe 4152 schtasks.exe 1964 schtasks.exe 2596 schtasks.exe 212 schtasks.exe 2272 schtasks.exe 2220 schtasks.exe 2184 schtasks.exe 3368 schtasks.exe 4376 schtasks.exe 1668 schtasks.exe 2988 schtasks.exe 876 schtasks.exe 3860 schtasks.exe 2696 schtasks.exe 1756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe Token: SeDebugPrivilege 2180 powershell.exe Token: SeDebugPrivilege 2940 powershell.exe Token: SeDebugPrivilege 4340 powershell.exe Token: SeDebugPrivilege 868 powershell.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 464 powershell.exe Token: SeDebugPrivilege 676 System.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3204 wrote to memory of 4524 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 87 PID 3204 wrote to memory of 4524 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 87 PID 4524 wrote to memory of 3960 4524 csc.exe 89 PID 4524 wrote to memory of 3960 4524 csc.exe 89 PID 3204 wrote to memory of 2940 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 105 PID 3204 wrote to memory of 2940 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 105 PID 3204 wrote to memory of 464 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 106 PID 3204 wrote to memory of 464 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 106 PID 3204 wrote to memory of 868 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 107 PID 3204 wrote to memory of 868 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 107 PID 3204 wrote to memory of 2708 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 108 PID 3204 wrote to memory of 2708 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 108 PID 3204 wrote to memory of 2180 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 109 PID 3204 wrote to memory of 2180 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 109 PID 3204 wrote to memory of 4340 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 110 PID 3204 wrote to memory of 4340 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 110 PID 3204 wrote to memory of 1644 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 117 PID 3204 wrote to memory of 1644 3204 6689bd9a5c795eedc631e5fbb850b7ff.exe 117 PID 1644 wrote to memory of 2684 1644 cmd.exe 119 PID 1644 wrote to memory of 2684 1644 cmd.exe 119 PID 1644 wrote to memory of 2172 1644 cmd.exe 120 PID 1644 wrote to memory of 2172 1644 cmd.exe 120 PID 1644 wrote to memory of 676 1644 cmd.exe 121 PID 1644 wrote to memory of 676 1644 cmd.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6689bd9a5c795eedc631e5fbb850b7ff.exe"C:\Users\Admin\AppData\Local\Temp\6689bd9a5c795eedc631e5fbb850b7ff.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kouygo1i\kouygo1i.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE0EA.tmp" "c:\Windows\System32\CSCE0BC87B84AB0403483D69997202A982A.TMP"3⤵PID:3960
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\Idle.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\Application\SetupMetrics\System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\RedistList\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\upfc.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\backgroundTaskHost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\6689bd9a5c795eedc631e5fbb850b7ff.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OhQ4v5Xt3r.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2684
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\System.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\System.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6689bd9a5c795eedc631e5fbb850b7ff6" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Local\Temp\6689bd9a5c795eedc631e5fbb850b7ff.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6689bd9a5c795eedc631e5fbb850b7ff" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\6689bd9a5c795eedc631e5fbb850b7ff.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6689bd9a5c795eedc631e5fbb850b7ff6" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\AppData\Local\Temp\6689bd9a5c795eedc631e5fbb850b7ff.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:212
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD56689bd9a5c795eedc631e5fbb850b7ff
SHA1b63d8e25d4eb9abea3ed0f7867f70db2ab18cba2
SHA256cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810b
SHA512ff51ccd8918344bb0439a4d9e39394383bff2196496d778db9a3d2862479e55f1bf59c7d467ff055c721231cb592c3c7ded63c5af28a3f9552dc6421dd1151bf
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
242B
MD51922ff1d477ca0f66ea0e7914e7ee873
SHA1c95937c5625207edf4e3f352ec529d918179561f
SHA256fc4984243b227509c7b6e078ef002d61c2651f4452f8c7f7ca6b3282e8ec68d2
SHA5129f9643e0009b9ca6a9f320b82f4a2836fbb912c23ebf0988196b9e38a088d4d71bfea1a0866e9288aa6aeba3af38de308b432b34f11c23d18e2f9e0ab31f5357
-
Filesize
1KB
MD5ad7a2768bf74c0f05959f874b9cf192d
SHA1f6a112d4d40dddff0e9c26c08cd2b34156d89c1e
SHA256d8bb247c4027625c6cbd6f53c5235d8c80d34c361f1a0a61e1e08e0023c7c221
SHA5128d7bcb7d8b05a7935103e477fc92fc74700ae55b3d55f423c0b47e7cf1f23d42208ba2348858be9cbeae361264abbe858d19332da0411fef04f3ce8214c2fcad
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
362B
MD5adbead2b7eebf734ee99b8cbf48415e5
SHA1931a90f2668865cd5e7c5ca945e8b56428f0f6db
SHA2561a77e4d8dde059a23f13e1fc9a7c407ecaadffdeca738aa5aef96c771476b6c4
SHA5122202fb6508bb73ec380efa50c869a07ea8c89dd7708d5b0b444f48a89a15aa0798ba09896a4704cc65da37037afb51aa92f68a1148fda756120718fc57218565
-
Filesize
235B
MD5df4d2da77fb9f92a7ef2d2ec0535883f
SHA1048c7b821d9cc1f0d4cc4ec53aa602f2a26ab060
SHA256ac4f38373d7f9b872ad0337ad213210705d5d3c977244335c3c40ca83016c354
SHA512bbfe38391e14b479cf761dcdc189bc2ba4dac74c577836caf150dd0f66814d1538f61a567d7d615842c5ed8f0014f6719b2356723a46043be22eaad00ec8cd02
-
Filesize
1KB
MD5be99f41194f5159cc131a1a4353a0e0a
SHA1f24e3bf06e777b4de8d072166cff693e43f2295c
SHA256564d9051e5639603c83562a9ff2c2e478cc7e13d54faf39f761297bac78603bf
SHA51251d1a50772bb7d689193e6a9b2e363185cf5438103644b2b68cf13e08274c5d99407b99f8cdc856143d28669f5ee4ee316041a8e33df42f55bfd181aa3f3c0f5