Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 02:54
Behavioral task
behavioral1
Sample
0bc68db77e687fa52b2f367994c5bc6f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0bc68db77e687fa52b2f367994c5bc6f.exe
Resource
win10v2004-20241007-en
General
-
Target
0bc68db77e687fa52b2f367994c5bc6f.exe
-
Size
2.5MB
-
MD5
0bc68db77e687fa52b2f367994c5bc6f
-
SHA1
ecf69c28aa53920f6279ad29d5bc9bb02542e841
-
SHA256
3055d261f05a0656b1b92d9fa8ed3a72111a3a5c6d036d13d3d3a304ca99b987
-
SHA512
fdb5c57a9a86961e895159543196c9b59c810827d82d7610ab8f9e220125f25c1867eae376c2f2aa1ae19b7899cd746dc18f6a56486cd4449766325a135421a1
-
SSDEEP
49152:ubA3jUx4QdTmxnMJUh+pDY92IXc3Mx+HqXQJc2cv1TDlHz:ubVdPpDYbNiIP2cvxZHz
Malware Config
Signatures
-
DcRat 58 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 4928 schtasks.exe 4248 schtasks.exe 3456 schtasks.exe 4652 schtasks.exe 732 schtasks.exe 2944 schtasks.exe 2604 schtasks.exe 3000 schtasks.exe 3220 schtasks.exe 4040 schtasks.exe 372 schtasks.exe 4344 schtasks.exe 1164 schtasks.exe 3744 schtasks.exe 2388 schtasks.exe 2180 schtasks.exe 2436 schtasks.exe 4636 schtasks.exe 3196 schtasks.exe 756 schtasks.exe 672 schtasks.exe 4392 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0bc68db77e687fa52b2f367994c5bc6f.exe 3140 schtasks.exe 2336 schtasks.exe 5080 schtasks.exe 1524 schtasks.exe 4940 schtasks.exe 2360 schtasks.exe 4656 schtasks.exe 2000 schtasks.exe 1936 schtasks.exe 3516 schtasks.exe 4872 schtasks.exe 4056 schtasks.exe 3320 schtasks.exe 3644 schtasks.exe 4964 schtasks.exe 1396 schtasks.exe 2948 schtasks.exe 4808 schtasks.exe 4596 schtasks.exe 2396 schtasks.exe 1492 schtasks.exe 2284 schtasks.exe 4388 schtasks.exe 1928 schtasks.exe 4476 schtasks.exe 2080 schtasks.exe 228 schtasks.exe 1680 schtasks.exe 1200 schtasks.exe 3996 schtasks.exe 4752 schtasks.exe 5028 schtasks.exe 3584 schtasks.exe 2860 schtasks.exe 400 schtasks.exe -
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\", \"C:\\Users\\Default User\\Idle.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\", \"C:\\Users\\Default User\\Idle.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\comSurrogatecontainercomponentRef\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\RuntimeBroker.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\", \"C:\\Users\\Default User\\Idle.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\comSurrogatecontainercomponentRef\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\RuntimeBroker.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\spoolsv.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\", \"C:\\Users\\Default User\\Idle.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\comSurrogatecontainercomponentRef\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\RuntimeBroker.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\spoolsv.exe\", \"C:\\Windows\\IME\\IMEKR\\smss.exe\", \"C:\\comSurrogatecontainercomponentRef\\taskhostw.exe\", \"C:\\Users\\Default User\\TextInputHost.exe\", \"C:\\Recovery\\WindowsRE\\OfficeClickToRun.exe\", \"C:\\comSurrogatecontainercomponentRef\\Idle.exe\", \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\", \"C:\\Users\\Default User\\Idle.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\comSurrogatecontainercomponentRef\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\RuntimeBroker.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\spoolsv.exe\", \"C:\\Windows\\IME\\IMEKR\\smss.exe\", \"C:\\comSurrogatecontainercomponentRef\\taskhostw.exe\", \"C:\\Users\\Default User\\TextInputHost.exe\", \"C:\\Recovery\\WindowsRE\\OfficeClickToRun.exe\", \"C:\\comSurrogatecontainercomponentRef\\Idle.exe\", \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\WmiPrvSE.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\", \"C:\\Users\\Default User\\Idle.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\comSurrogatecontainercomponentRef\\winlogon.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\", \"C:\\Users\\Default User\\Idle.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\comSurrogatecontainercomponentRef\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\RuntimeBroker.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\spoolsv.exe\", \"C:\\Windows\\IME\\IMEKR\\smss.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\", \"C:\\Users\\Default User\\Idle.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\comSurrogatecontainercomponentRef\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\RuntimeBroker.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\spoolsv.exe\", \"C:\\Windows\\IME\\IMEKR\\smss.exe\", \"C:\\comSurrogatecontainercomponentRef\\taskhostw.exe\", \"C:\\Users\\Default User\\TextInputHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\", \"C:\\Users\\Default User\\Idle.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\", \"C:\\Users\\Default User\\Idle.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\comSurrogatecontainercomponentRef\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\RuntimeBroker.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\spoolsv.exe\", \"C:\\Windows\\IME\\IMEKR\\smss.exe\", \"C:\\comSurrogatecontainercomponentRef\\taskhostw.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\", \"C:\\Users\\Default User\\Idle.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\comSurrogatecontainercomponentRef\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\RuntimeBroker.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\spoolsv.exe\", \"C:\\Windows\\IME\\IMEKR\\smss.exe\", \"C:\\comSurrogatecontainercomponentRef\\taskhostw.exe\", \"C:\\Users\\Default User\\TextInputHost.exe\", \"C:\\Recovery\\WindowsRE\\OfficeClickToRun.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\TextInputHost.exe\", \"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\", \"C:\\comSurrogatecontainercomponentRef\\csrss.exe\", \"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\", \"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\", \"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\", \"C:\\Users\\Default User\\Idle.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\comSurrogatecontainercomponentRef\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\RuntimeBroker.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\spoolsv.exe\", \"C:\\Windows\\IME\\IMEKR\\smss.exe\", \"C:\\comSurrogatecontainercomponentRef\\taskhostw.exe\", \"C:\\Users\\Default User\\TextInputHost.exe\", \"C:\\Recovery\\WindowsRE\\OfficeClickToRun.exe\", \"C:\\comSurrogatecontainercomponentRef\\Idle.exe\"" SavesintoHost.exe -
Process spawned unexpected child process 57 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3140 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4964 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 228 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2948 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4248 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4596 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1396 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3220 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4752 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1928 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5028 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3516 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4872 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1524 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4344 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 400 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4056 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3320 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4476 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3196 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3644 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 756 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4636 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4940 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4040 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3744 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3996 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3456 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2360 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4652 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4656 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5080 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 372 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2396 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 732 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1680 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4808 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2388 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4388 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 672 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4928 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2080 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3584 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 1080 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4392 1080 schtasks.exe 87 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe -
resource yara_rule behavioral2/files/0x0008000000023bd9-15.dat dcrat behavioral2/memory/4800-17-0x0000000000250000-0x000000000048E000-memory.dmp dcrat behavioral2/files/0x0007000000023c99-151.dat dcrat -
Checks computer location settings 2 TTPs 17 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation SavesintoHost.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 0bc68db77e687fa52b2f367994c5bc6f.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation SavesintoHost.exe -
Executes dropped EXE 16 IoCs
pid Process 4800 SavesintoHost.exe 3276 SavesintoHost.exe 436 OfficeClickToRun.exe 4756 OfficeClickToRun.exe 1492 OfficeClickToRun.exe 2604 OfficeClickToRun.exe 2680 OfficeClickToRun.exe 2288 OfficeClickToRun.exe 3268 OfficeClickToRun.exe 400 OfficeClickToRun.exe 2748 OfficeClickToRun.exe 4144 OfficeClickToRun.exe 3324 OfficeClickToRun.exe 2876 OfficeClickToRun.exe 2300 OfficeClickToRun.exe 3208 OfficeClickToRun.exe -
Adds Run key to start application 2 TTPs 38 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\IME\\IMEKR\\smss.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\comSurrogatecontainercomponentRef\\taskhostw.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\comSurrogatecontainercomponentRef\\taskhostw.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\comSurrogatecontainercomponentRef\\Idle.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Recovery\\WindowsRE\\TextInputHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Recovery\\WindowsRE\\StartMenuExperienceHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\IME\\IMEKR\\smss.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Users\\Default User\\TextInputHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\comSurrogatecontainercomponentRef\\Idle.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\comSurrogatecontainercomponentRef\\csrss.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\comSurrogatecontainercomponentRef\\winlogon.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\comSurrogatecontainercomponentRef\\winlogon.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\RuntimeBroker.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\WmiPrvSE.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Default User\\Idle.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Users\\All Users\\Packages\\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\\S-1-5-21-3442511616-637977696-3186306149-1000\\spoolsv.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Recovery\\WindowsRE\\TextInputHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\comSurrogatecontainercomponentRef\\csrss.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Default User\\Idle.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\RuntimeBroker.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Recovery\\WindowsRE\\TextInputHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Users\\Default User\\TextInputHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Recovery\\WindowsRE\\OfficeClickToRun.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Recovery\\WindowsRE\\TextInputHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Recovery\\WindowsRE\\Registry.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SavesintoHost = "\"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SavesintoHost = "\"C:\\Program Files\\Uninstall Information\\SavesintoHost.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Recovery\\WindowsRE\\Registry.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Recovery\\WindowsRE\\OfficeClickToRun.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\WmiPrvSE.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files (x86)\\Windows Defender\\uk-UA\\explorer.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\spoolsv.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\spoolsv.exe\"" SavesintoHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Program Files\\Common Files\\System\\ja-JP\\sysmon.exe\"" SavesintoHost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesintoHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SavesintoHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OfficeClickToRun.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\RuntimeBroker.exe SavesintoHost.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\9e8d7a4ca61bd9 SavesintoHost.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\WmiPrvSE.exe SavesintoHost.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\24dbde2999530e SavesintoHost.exe File created C:\Program Files\Common Files\System\ja-JP\sysmon.exe SavesintoHost.exe File created C:\Program Files\Common Files\System\ja-JP\121e5b5079f7c0 SavesintoHost.exe File created C:\Program Files (x86)\Windows Defender\uk-UA\explorer.exe SavesintoHost.exe File created C:\Program Files (x86)\Windows Defender\uk-UA\7a0fd90576e088 SavesintoHost.exe File created C:\Program Files\Uninstall Information\SavesintoHost.exe SavesintoHost.exe File created C:\Program Files\Uninstall Information\c6eda052d5d295 SavesintoHost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\OCR\en-us\SppExtComObj.exe SavesintoHost.exe File created C:\Windows\SoftwareDistribution\DataStore\Logs\spoolsv.exe SavesintoHost.exe File created C:\Windows\SoftwareDistribution\DataStore\Logs\f3b6ecef712a24 SavesintoHost.exe File created C:\Windows\IME\IMEKR\smss.exe SavesintoHost.exe File created C:\Windows\IME\IMEKR\69ddcba757bf72 SavesintoHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0bc68db77e687fa52b2f367994c5bc6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings SavesintoHost.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 0bc68db77e687fa52b2f367994c5bc6f.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OfficeClickToRun.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 57 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3140 schtasks.exe 1200 schtasks.exe 4656 schtasks.exe 2944 schtasks.exe 3584 schtasks.exe 5028 schtasks.exe 4056 schtasks.exe 4928 schtasks.exe 2604 schtasks.exe 3000 schtasks.exe 2860 schtasks.exe 1524 schtasks.exe 3196 schtasks.exe 2360 schtasks.exe 4392 schtasks.exe 4964 schtasks.exe 4248 schtasks.exe 1928 schtasks.exe 2284 schtasks.exe 4808 schtasks.exe 2388 schtasks.exe 2436 schtasks.exe 2336 schtasks.exe 3456 schtasks.exe 228 schtasks.exe 3220 schtasks.exe 3996 schtasks.exe 4344 schtasks.exe 1492 schtasks.exe 732 schtasks.exe 4388 schtasks.exe 3516 schtasks.exe 4040 schtasks.exe 372 schtasks.exe 4596 schtasks.exe 3744 schtasks.exe 672 schtasks.exe 2180 schtasks.exe 1396 schtasks.exe 2000 schtasks.exe 5080 schtasks.exe 2948 schtasks.exe 4476 schtasks.exe 3644 schtasks.exe 4636 schtasks.exe 4652 schtasks.exe 2396 schtasks.exe 4872 schtasks.exe 3320 schtasks.exe 756 schtasks.exe 4940 schtasks.exe 1164 schtasks.exe 1680 schtasks.exe 2080 schtasks.exe 4752 schtasks.exe 400 schtasks.exe 1936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4800 SavesintoHost.exe 4800 SavesintoHost.exe 4800 SavesintoHost.exe 4800 SavesintoHost.exe 4800 SavesintoHost.exe 4800 SavesintoHost.exe 4800 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 3276 SavesintoHost.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 436 OfficeClickToRun.exe 4756 OfficeClickToRun.exe 4756 OfficeClickToRun.exe 4756 OfficeClickToRun.exe 4756 OfficeClickToRun.exe 4756 OfficeClickToRun.exe 4756 OfficeClickToRun.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 4800 SavesintoHost.exe Token: SeDebugPrivilege 3276 SavesintoHost.exe Token: SeDebugPrivilege 436 OfficeClickToRun.exe Token: SeDebugPrivilege 4756 OfficeClickToRun.exe Token: SeDebugPrivilege 1492 OfficeClickToRun.exe Token: SeDebugPrivilege 2604 OfficeClickToRun.exe Token: SeDebugPrivilege 2680 OfficeClickToRun.exe Token: SeDebugPrivilege 2288 OfficeClickToRun.exe Token: SeDebugPrivilege 3268 OfficeClickToRun.exe Token: SeDebugPrivilege 400 OfficeClickToRun.exe Token: SeDebugPrivilege 2748 OfficeClickToRun.exe Token: SeDebugPrivilege 4144 OfficeClickToRun.exe Token: SeDebugPrivilege 3324 OfficeClickToRun.exe Token: SeDebugPrivilege 2876 OfficeClickToRun.exe Token: SeDebugPrivilege 2300 OfficeClickToRun.exe Token: SeDebugPrivilege 3208 OfficeClickToRun.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 4588 2468 0bc68db77e687fa52b2f367994c5bc6f.exe 82 PID 2468 wrote to memory of 4588 2468 0bc68db77e687fa52b2f367994c5bc6f.exe 82 PID 2468 wrote to memory of 4588 2468 0bc68db77e687fa52b2f367994c5bc6f.exe 82 PID 2468 wrote to memory of 1992 2468 0bc68db77e687fa52b2f367994c5bc6f.exe 83 PID 2468 wrote to memory of 1992 2468 0bc68db77e687fa52b2f367994c5bc6f.exe 83 PID 2468 wrote to memory of 1992 2468 0bc68db77e687fa52b2f367994c5bc6f.exe 83 PID 4588 wrote to memory of 1104 4588 WScript.exe 84 PID 4588 wrote to memory of 1104 4588 WScript.exe 84 PID 4588 wrote to memory of 1104 4588 WScript.exe 84 PID 1104 wrote to memory of 4800 1104 cmd.exe 86 PID 1104 wrote to memory of 4800 1104 cmd.exe 86 PID 4800 wrote to memory of 3276 4800 SavesintoHost.exe 94 PID 4800 wrote to memory of 3276 4800 SavesintoHost.exe 94 PID 3276 wrote to memory of 2400 3276 SavesintoHost.exe 146 PID 3276 wrote to memory of 2400 3276 SavesintoHost.exe 146 PID 2400 wrote to memory of 3944 2400 cmd.exe 148 PID 2400 wrote to memory of 3944 2400 cmd.exe 148 PID 2400 wrote to memory of 436 2400 cmd.exe 149 PID 2400 wrote to memory of 436 2400 cmd.exe 149 PID 436 wrote to memory of 2972 436 OfficeClickToRun.exe 152 PID 436 wrote to memory of 2972 436 OfficeClickToRun.exe 152 PID 436 wrote to memory of 4984 436 OfficeClickToRun.exe 153 PID 436 wrote to memory of 4984 436 OfficeClickToRun.exe 153 PID 2972 wrote to memory of 4756 2972 WScript.exe 158 PID 2972 wrote to memory of 4756 2972 WScript.exe 158 PID 4756 wrote to memory of 400 4756 OfficeClickToRun.exe 159 PID 4756 wrote to memory of 400 4756 OfficeClickToRun.exe 159 PID 4756 wrote to memory of 3592 4756 OfficeClickToRun.exe 160 PID 4756 wrote to memory of 3592 4756 OfficeClickToRun.exe 160 PID 400 wrote to memory of 1492 400 WScript.exe 163 PID 400 wrote to memory of 1492 400 WScript.exe 163 PID 1492 wrote to memory of 856 1492 OfficeClickToRun.exe 164 PID 1492 wrote to memory of 856 1492 OfficeClickToRun.exe 164 PID 1492 wrote to memory of 1808 1492 OfficeClickToRun.exe 165 PID 1492 wrote to memory of 1808 1492 OfficeClickToRun.exe 165 PID 856 wrote to memory of 2604 856 WScript.exe 166 PID 856 wrote to memory of 2604 856 WScript.exe 166 PID 2604 wrote to memory of 4732 2604 OfficeClickToRun.exe 167 PID 2604 wrote to memory of 4732 2604 OfficeClickToRun.exe 167 PID 2604 wrote to memory of 1880 2604 OfficeClickToRun.exe 168 PID 2604 wrote to memory of 1880 2604 OfficeClickToRun.exe 168 PID 4732 wrote to memory of 2680 4732 WScript.exe 169 PID 4732 wrote to memory of 2680 4732 WScript.exe 169 PID 2680 wrote to memory of 4068 2680 OfficeClickToRun.exe 170 PID 2680 wrote to memory of 4068 2680 OfficeClickToRun.exe 170 PID 2680 wrote to memory of 1124 2680 OfficeClickToRun.exe 171 PID 2680 wrote to memory of 1124 2680 OfficeClickToRun.exe 171 PID 4068 wrote to memory of 2288 4068 WScript.exe 172 PID 4068 wrote to memory of 2288 4068 WScript.exe 172 PID 2288 wrote to memory of 1748 2288 OfficeClickToRun.exe 173 PID 2288 wrote to memory of 1748 2288 OfficeClickToRun.exe 173 PID 2288 wrote to memory of 5044 2288 OfficeClickToRun.exe 174 PID 2288 wrote to memory of 5044 2288 OfficeClickToRun.exe 174 PID 1748 wrote to memory of 3268 1748 WScript.exe 175 PID 1748 wrote to memory of 3268 1748 WScript.exe 175 PID 3268 wrote to memory of 4200 3268 OfficeClickToRun.exe 176 PID 3268 wrote to memory of 4200 3268 OfficeClickToRun.exe 176 PID 3268 wrote to memory of 4716 3268 OfficeClickToRun.exe 177 PID 3268 wrote to memory of 4716 3268 OfficeClickToRun.exe 177 PID 4200 wrote to memory of 400 4200 WScript.exe 178 PID 4200 wrote to memory of 400 4200 WScript.exe 178 PID 400 wrote to memory of 2180 400 OfficeClickToRun.exe 179 PID 400 wrote to memory of 2180 400 OfficeClickToRun.exe 179 PID 400 wrote to memory of 5012 400 OfficeClickToRun.exe 180 -
System policy modification 1 TTPs 48 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesintoHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OfficeClickToRun.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bc68db77e687fa52b2f367994c5bc6f.exe"C:\Users\Admin\AppData\Local\Temp\0bc68db77e687fa52b2f367994c5bc6f.exe"1⤵
- DcRat
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\comSurrogatecontainercomponentRef\4Vp3r4P.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\comSurrogatecontainercomponentRef\QZY1IZ9a6YLs5.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\comSurrogatecontainercomponentRef\SavesintoHost.exe"C:\comSurrogatecontainercomponentRef\SavesintoHost.exe"4⤵
- Modifies WinLogon for persistence
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4800 -
C:\comSurrogatecontainercomponentRef\SavesintoHost.exe"C:\comSurrogatecontainercomponentRef\SavesintoHost.exe"5⤵
- Modifies WinLogon for persistence
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3276 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\e1o2c1JpZz.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:3944
-
-
C:\Recovery\WindowsRE\OfficeClickToRun.exe"C:\Recovery\WindowsRE\OfficeClickToRun.exe"7⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:436 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8590b6f5-f6dd-4805-8bea-194ada6cf8a5.vbs"8⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Recovery\WindowsRE\OfficeClickToRun.exeC:\Recovery\WindowsRE\OfficeClickToRun.exe9⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4756 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\74acfc54-34d7-4ddb-ba45-09aaf95af4ee.vbs"10⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Recovery\WindowsRE\OfficeClickToRun.exeC:\Recovery\WindowsRE\OfficeClickToRun.exe11⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1492 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9ab81ed9-f49d-4019-97e5-4957e10d9f56.vbs"12⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Recovery\WindowsRE\OfficeClickToRun.exeC:\Recovery\WindowsRE\OfficeClickToRun.exe13⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2604 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8a70acb3-add1-4b07-9eee-6b7f71a2c562.vbs"14⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Recovery\WindowsRE\OfficeClickToRun.exeC:\Recovery\WindowsRE\OfficeClickToRun.exe15⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2680 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4fcf11aa-6a30-45b4-ac86-e254b820455d.vbs"16⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Recovery\WindowsRE\OfficeClickToRun.exeC:\Recovery\WindowsRE\OfficeClickToRun.exe17⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2288 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\05f96f33-efb2-425b-b853-6947b52c1e6a.vbs"18⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Recovery\WindowsRE\OfficeClickToRun.exeC:\Recovery\WindowsRE\OfficeClickToRun.exe19⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3268 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7933e2be-940d-409f-94a5-55c3a22cf727.vbs"20⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Recovery\WindowsRE\OfficeClickToRun.exeC:\Recovery\WindowsRE\OfficeClickToRun.exe21⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:400 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f6588c03-3003-4bff-afc8-395e2799a149.vbs"22⤵PID:2180
-
C:\Recovery\WindowsRE\OfficeClickToRun.exeC:\Recovery\WindowsRE\OfficeClickToRun.exe23⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2748 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\62ede110-a4dc-4232-b362-d5f2b62c32b5.vbs"24⤵PID:1668
-
C:\Recovery\WindowsRE\OfficeClickToRun.exeC:\Recovery\WindowsRE\OfficeClickToRun.exe25⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4144 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\80ff9cf4-144a-41a5-94e9-89eca6a7cb3b.vbs"26⤵PID:3600
-
C:\Recovery\WindowsRE\OfficeClickToRun.exeC:\Recovery\WindowsRE\OfficeClickToRun.exe27⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3324 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\96918904-7047-472a-9988-564a3ef003f8.vbs"28⤵PID:4480
-
C:\Recovery\WindowsRE\OfficeClickToRun.exeC:\Recovery\WindowsRE\OfficeClickToRun.exe29⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2876 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\04c63d63-a74e-4d05-97c4-09055aa9dec1.vbs"30⤵PID:4448
-
C:\Recovery\WindowsRE\OfficeClickToRun.exeC:\Recovery\WindowsRE\OfficeClickToRun.exe31⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2300 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\54f0898b-2562-498c-96df-cab99157ce8c.vbs"32⤵PID:856
-
C:\Recovery\WindowsRE\OfficeClickToRun.exeC:\Recovery\WindowsRE\OfficeClickToRun.exe33⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3208 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cc3af9c0-ef55-43f4-8709-1dc38dfbfb2d.vbs"34⤵PID:4336
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dc9aebca-e7d3-4be0-b0ec-b5807c1fa03a.vbs"34⤵PID:4008
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5c8a3b16-c2c1-4109-ba59-b9f1c8c48d70.vbs"32⤵PID:1496
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3699ee93-4ebf-46e4-818d-7c8358806883.vbs"30⤵PID:4972
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bcda2aa7-1ee3-4013-bb3b-59cd4f51881e.vbs"28⤵PID:4564
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\254aee40-5ba0-43dd-b7f0-26e04007433c.vbs"26⤵PID:1084
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2f36a063-be09-4118-871f-b0692e9ce5b4.vbs"24⤵PID:4424
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5d335502-5c52-4371-a424-75bd52835d62.vbs"22⤵PID:5012
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\02d85805-e9d2-4c6a-9874-52a74d39f807.vbs"20⤵PID:4716
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\70f5b99c-91ac-40fe-941c-09ca04467823.vbs"18⤵PID:5044
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9b3fae8a-e1dc-45b1-8624-8b66306d2356.vbs"16⤵PID:1124
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7b87b13f-43e8-4cb4-a773-8431f33e2445.vbs"14⤵PID:1880
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d7b99b9b-f91e-4a7b-966a-432673c41128.vbs"12⤵PID:1808
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e4ec7830-a6ba-4473-8252-5524d4dd3776.vbs"10⤵PID:3592
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b0b63798-bf6f-430a-a345-645effe0907c.vbs"8⤵PID:4984
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\comSurrogatecontainercomponentRef\file.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Program Files\Common Files\System\ja-JP\sysmon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files\Common Files\System\ja-JP\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\Program Files\Common Files\System\ja-JP\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\comSurrogatecontainercomponentRef\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\comSurrogatecontainercomponentRef\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\comSurrogatecontainercomponentRef\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\S-1-5-21-3442511616-637977696-3186306149-1000\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\All Users\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\S-1-5-21-3442511616-637977696-3186306149-1000\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\S-1-5-21-3442511616-637977696-3186306149-1000\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SavesintoHostS" /sc MINUTE /mo 11 /tr "'C:\Program Files\Uninstall Information\SavesintoHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SavesintoHost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\SavesintoHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SavesintoHostS" /sc MINUTE /mo 10 /tr "'C:\Program Files\Uninstall Information\SavesintoHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\comSurrogatecontainercomponentRef\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\comSurrogatecontainercomponentRef\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\comSurrogatecontainercomponentRef\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Windows\SoftwareDistribution\DataStore\Logs\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\DataStore\Logs\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Windows\SoftwareDistribution\DataStore\Logs\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Windows\IME\IMEKR\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\IME\IMEKR\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Windows\IME\IMEKR\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\comSurrogatecontainercomponentRef\taskhostw.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\comSurrogatecontainercomponentRef\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\comSurrogatecontainercomponentRef\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\TextInputHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\Default User\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\comSurrogatecontainercomponentRef\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\comSurrogatecontainercomponentRef\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\comSurrogatecontainercomponentRef\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4392
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
842B
MD5af78c11b42bf09d38843ddfbc4057371
SHA1d4ee2ac46153eb4d174f6d67e82a46292492ee24
SHA2562c286dbdbaf683f52e65ab0e7c5419892d253e61590bf925a6c9d983ba51d63d
SHA5129502221391ca09ec27d398f565660724a8cd52cc24ff70df2c2c05ca46788ba8f72e7eff4ed5fb31dd96244f0dc16879e1007951ae294c4ce49fffc3bde280aa
-
Filesize
1KB
MD549b64127208271d8f797256057d0b006
SHA1b99bd7e2b4e9ed24de47fb3341ea67660b84cca1
SHA2562a5d403a2e649d8eceef8f785eeb0f6d33888ec6bbf251b3c347e34cb32b1e77
SHA512f7c728923c893dc9bc88ad2159e0abcda41e1b40ff7e7756e6252d135ed238a2248a2662b3392449836dd1b0b580f0c866cc33e409527484fe4602e3d3f10e3e
-
Filesize
1KB
MD5655010c15ea0ca05a6e5ddcd84986b98
SHA1120bf7e516aeed462c07625fbfcdab5124ad05d3
SHA2562b1ffeab025cc7c61c50e3e2e4c9253046d9174cf00181a8c1de733a4c0daa14
SHA512e52c26718d7d1e979837b5ac626dde26920fe7413b8aa7be6f1be566a1b0f035582f4d313400e3ad6b92552abb1dfaf186b60b875fb955a2a94fd839fe841437
-
Filesize
718B
MD5ee8cba88d4b8f28e2b81c8279774f0cd
SHA1195f956daa44f195ba5509d632f4488983910811
SHA256a36039e98be53a9be919ff808f7f7dea951140d20d4d3f8dd8b0f91162ab6130
SHA512fdd5afd4ccf6c377fcb011c77e52d52613bc69f4daf22455ecd1a4df3d6d60229f30f84351ff099c9a4f46ae938ebf43d075ffcb30f0897836cb21c0fcf7f880
-
Filesize
718B
MD5426eb71e0460aa1e19d3d407e14e66a4
SHA1a87dfd060a0f2080a8be5b87fa3e8d305fee12a8
SHA256ff87b3c943bc1fcc0d338921e7b1f8702b6056fcea397318711daaabc1419b67
SHA5125828a12a56066d2b9ddb7286cd7c488861f70fd05b05ddf299d4c05da53dfd84defda687589d616eead296ceed86ca85ef0ecaed78ad42eac75082180f6a301b
-
Filesize
2.2MB
MD5ab1c6b008870531b6c4de136962b5716
SHA16b6bdcfe3d4efa006148652bc7efef584ac8a7cc
SHA256bcdd7572587a9f9d5d56eb5d6f8e76fffb852e42b78425de3fb0d53c1ac9630e
SHA512bb859f0e45c4cc2f6189b02521d0dba4b11998e1560896cd32e455d581d114c5d63bef3e9bb464ff8a602f970daecec838a7e6e804282391278f229c691df9a4
-
Filesize
718B
MD5daa4d8fbc4c11168ff53ebe43e8012f7
SHA1410b66b8ee12980607840430e8d61583ea7f353d
SHA256c2f17605c61f658fbddc653b5e1a0dd0cee7cfd777356f7772c859482c443cf8
SHA51269fbcf48cf3af24e611b74102a939e87f892edd3537b12342e6a9dd12fc6523cb3f7086c7d73f6de768aa0d0e48be405cb05ea737e32e343a0b06f4f749cafd5
-
Filesize
718B
MD5f7bbe07284e6ac5ca3a3e401514803d8
SHA1ebe4446224efa345b11f3b079c9e564bfa2b674b
SHA256dc556a249c9c71b15d0e09c85b6133e916dedd7980f419cb057e8cee33d14d26
SHA512e5e112ad26765e217af6c7cdb62453b6b4dfbf38cc5e1a60159cc08e24da92f6a6f447b78a1035c16d56343d64144eb3b127648a1bcc0736db88ede80cec921c
-
Filesize
718B
MD5219cb49c10b1359125263d7a606a9f5c
SHA185ca987ba6fcd2e2ce4d43cced9c71c0b7fce519
SHA2560c858cb49172e55c2b8db52c6515ecbf05007105a069600941100898e8a0864e
SHA51214baf2d88fd023b49b73a50a488f0b69df9cff1aefcceaf05b69d8fbaf7f69f6700c9ffc5a4958096bcbc7750c817defc6036357bb8aa7c07a4731039b38e272
-
Filesize
718B
MD5efbd8ada08e1ea80fa9fd0c45f3ded80
SHA196ea42d466578cf5525069fa1b5b01fd3a94625a
SHA256f64c575182dedd934ab2b2e67a51abb467ae9c47ba033c8b5be648754c672b71
SHA512d73d7795ee9dda747120d60204b62c9573b7f826b714033d3279b9157242563996ae6764ae0eb636166ca78676ee142424c3639babe30d215b894e494fde2e86
-
Filesize
718B
MD521c51d408b1a98f4cfd1131eca77b842
SHA160e8c34739a647c23e00d1a73b0ddc8b981e55bc
SHA2568415d18a387ab7f7410bfe60ecb579eac912f227fda3f622434b796af7a75a9d
SHA5121e5d93402fdd17294edb39c2925416222da650fad2c46c418328165ce4984a13055d7db741b16b8f77eb1a99f6d74d2d244181d7e3cca3666c974942536647d8
-
Filesize
718B
MD5963847708425fb03afea03aac1c23f58
SHA1a50d61dbf2a7eacca0b3ba52a4e57a74ad8044ef
SHA25659830b5ec511d78d8823fa9e83db31c1e252ce62617fc2bd9af680273932b14c
SHA512e8fc4c550b9e70e477be0e00296baf410a1901124c8527eaf69e138113ee29efdcfbd3fd64c884a91cc55e7c618372f280faffe584350edbaf91ac9ce2a2d03c
-
Filesize
717B
MD5abdbf06cd124e61117e92e1a0b66e4fa
SHA15d42eb817ddd30c6313970ea9b4e860540933bb2
SHA2568e16b14bf6e7cd5ddc61c0dba121551c2861f6365c964da59befe8cc18f71d0f
SHA512d083d0a44730bef095af8f1f6fbe2a09f9077a57b0370b32858f9fb806aef66a0f899ed3fbd9f425ab1d633787969748b6b5fbe0b60050db9e09adcc03b85454
-
Filesize
718B
MD5683f947cac89e72491c68850b80a8d76
SHA1933e35aa90fefe3a5ca8e03283ef8ca28390cb61
SHA25655f9c4f5dbd3a8a54f492ac5405cae641228957dfdf26da173c554a52c00542d
SHA512b17c842b387867b7041beb311953812d5c7928c1aa7b1a3cdd67b9c5e9d67b9d695dbdb12e06aea9b81709794264188543def17d68ca0693bbd5991eef909672
-
Filesize
718B
MD5cee31ffa554a3f010938435e7fa31896
SHA179a5ac05a78b90435141a12850dfdd9e396aecfa
SHA256dcd2f8d043972bd0646ab7606d82a8c401f08a2bea097e5458d9ad65666adfcc
SHA51258f78d6fcabe5c5d4909b3cbd9450331dd6a15e4254aeb5f1a84537086139371832ff8e18818bca370db8fb9df1a5f301fdae266d3b4bceb8169329c3d22c82c
-
Filesize
718B
MD5c78b04c77c6d3f0f458552810da65a2c
SHA1380cc47e08a03b7619bf0dc90b00e930aefaec5e
SHA256927f9e044ee230ab081832b1f8d65d3cd21e7cf7f89523437fd62c4c7ca68e2c
SHA512085cb3dabf8b92013cec451cdae4428fbfa856cdccb8e0ec1d8ec87769655c7d71d6a74ccbf475cfaef1d82869ec720c180524be56524912739cce1cbdf720f2
-
Filesize
494B
MD5b6c79a02e963bb66df7cb5fdf5b953ff
SHA1de7bb234bb0393e7327fc699b1a0920dace793d1
SHA256c4d51b656247b6afbba38050ac1b85d5d7cbb96592c582361dbee0417a2fdbd6
SHA512acca3fde5f2758090cdf22cf9fe2bb8f1db0fe1c09674a04e7fc44556c2d7276b749861858126118c1c59ac202c6dfbce2c62a1a95debb02463207d808efe692
-
Filesize
207B
MD5aedc134013cc5836bd898342bb8a0b44
SHA1ec632af838a61a3a66296b2bbc4a2ba886915b22
SHA256fff4ad2553d5d87cd309d04f0c17857107df79508ad8dfe190947e13f3cfd5e2
SHA51288442ff855e697c41b46bb92e4b2e8fc955748a51743429fdb515d96c055d1b222db2b19eae641634873108f5dfed51d44a453cd4694df9937d3634c28c91b8d
-
Filesize
717B
MD5df4b33feefdca5b97c820726fa37c4bf
SHA17cd40bf533f4ac2bf60f9e0141fc977dcc197b16
SHA2569374d520fe91354e93615ed1a33b5ce08a9d5a172056feff88732fa03598a8cc
SHA5121c65da9d5fd390d4779280b5249b733975d669c74e3a54d34ffd7933aab60224cc006c6b0b7c4f825d52a4ebffd5de6e1546be845ff19b9b32cffa834903f59f
-
Filesize
223B
MD55d646684debbc53c0c7ec5fa65f23216
SHA1c161dec715fcc4156442fc30eaf6b3d0caddfb17
SHA256cddd4a030f867acb39a0e7697732cbd57bb2e5e9f0d81fc1e7d752d57c1ee195
SHA512e6518ff37848e7e92d9b820b3eecea2a0d0d85fd6804a8b4f4adf56154aa1a1d5433c3333d469bc8e2ffb9f4ebb4445f979467f970f9155774a670fe5446c19a
-
Filesize
56B
MD5cbba91293fed3dfb5a3a0cd0ec53b505
SHA16d66eaa19e366c386d006b8b782cda171c359c43
SHA256062cff19b7be8c7d9c9941f75b9225982eb3799a766ee73659251f7d0c0b299d
SHA512a97640da0d86256b3512d84c9a5120e41cb7ed47f3a61f8f4f6212804034a8e19a99fc35a3b91804734c93279b74b23737e31e224152d3e6a17e113fd4bca0f4
-
Filesize
2.2MB
MD53aa1bbd17d68b0b67b7423f1fe09b05b
SHA161c43b8f31a51d772fd39d5caa87699d74971a43
SHA2567362f82084bcdf47b0927674ad678f66214e8d4f2783a0b9338ee4eb773c3474
SHA5127ae82411565104b15cc0de4cc8315d93301befbb28b1e36e3c50d46c8ba9fb1ff8eb361e12cd9d32771e2a5ecbee9b026aca0105473a9fe5a877fc2744b32014
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a