Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 02:14
Static task
static1
Behavioral task
behavioral1
Sample
4944035addbf7b1db7cf58fca9cda3050fbf87c3b5ca18dc124ceae5767a8bea.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4944035addbf7b1db7cf58fca9cda3050fbf87c3b5ca18dc124ceae5767a8bea.exe
Resource
win10v2004-20241007-en
General
-
Target
4944035addbf7b1db7cf58fca9cda3050fbf87c3b5ca18dc124ceae5767a8bea.exe
-
Size
19KB
-
MD5
74f1fcf96c9e31f50f6d83072ec68d07
-
SHA1
f05ada88e038fef51b6f0840084cd0f155faaa0e
-
SHA256
4944035addbf7b1db7cf58fca9cda3050fbf87c3b5ca18dc124ceae5767a8bea
-
SHA512
2816798078e430930c77c7d992924a07159dea089d1462bc17833b197545af5eebbaecca23869b1b880128bf82c4a0ab815c490c7a08ca6ed7e48099ef479074
-
SSDEEP
384:uJMu1ZUZebwYr/lfbX6b+f9daNutwoLmdKkd/rwmW:E11Zzb1bQ+fXaNOST/rU
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 42 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 212 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4160 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5024 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 368 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1388 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2352 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4756 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3532 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3172 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5060 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 776 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4492 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1136 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3964 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3356 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4100 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5088 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 680 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4076 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1264 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4800 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 996 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3856 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1784 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4616 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1884 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1576 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4704 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4204 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2956 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3312 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 684 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5012 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 536 3664 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 392 3664 schtasks.exe 90 -
resource yara_rule behavioral2/files/0x000a000000023ca9-7.dat dcrat behavioral2/files/0x0007000000023cb0-23.dat dcrat behavioral2/memory/2356-25-0x00000000007C0000-0x00000000008A2000-memory.dmp dcrat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 4944035addbf7b1db7cf58fca9cda3050fbf87c3b5ca18dc124ceae5767a8bea.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 0xias2ag.kcz.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WinLatency.exe -
Executes dropped EXE 3 IoCs
pid Process 4920 0xias2ag.kcz.exe 2356 WinLatency.exe 220 conhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 raw.githubusercontent.com 7 raw.githubusercontent.com -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\Windows Mail\088424020bedd6 WinLatency.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\Idle.exe WinLatency.exe File created C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe WinLatency.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\ea9f0e6c9e2dcd WinLatency.exe File created C:\Program Files\Windows Mail\conhost.exe WinLatency.exe File created C:\Program Files\Google\ee2ad38f3d4382 WinLatency.exe File created C:\Program Files\Windows Mail\lsass.exe WinLatency.exe File created C:\Program Files (x86)\Windows Multimedia Platform\7a0fd90576e088 WinLatency.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\csrss.exe WinLatency.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\886983d96e3d3e WinLatency.exe File created C:\Program Files\Google\Registry.exe WinLatency.exe File created C:\Program Files\Windows Mail\6203df4a6bafc7 WinLatency.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\6ccacd8608530f WinLatency.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe WinLatency.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Registration\5940a34987c991 WinLatency.exe File created C:\Windows\Web\4K\WinLatency.exe WinLatency.exe File created C:\Windows\IME\IMEKR\HELP\6203df4a6bafc7 WinLatency.exe File created C:\Windows\Offline Web Pages\taskhostw.exe WinLatency.exe File created C:\Windows\Offline Web Pages\ea9f0e6c9e2dcd WinLatency.exe File created C:\Windows\Registration\dllhost.exe WinLatency.exe File created C:\Windows\Web\4K\51bf4d198ee986 WinLatency.exe File created C:\Windows\WaaS\services\Idle.exe WinLatency.exe File created C:\Windows\IME\IMEKR\HELP\lsass.exe WinLatency.exe File opened for modification C:\Windows\IME\IMEKR\HELP\lsass.exe WinLatency.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4944035addbf7b1db7cf58fca9cda3050fbf87c3b5ca18dc124ceae5767a8bea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0xias2ag.kcz.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 0xias2ag.kcz.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings WinLatency.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings conhost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5024 schtasks.exe 4204 schtasks.exe 4492 schtasks.exe 1136 schtasks.exe 4076 schtasks.exe 1264 schtasks.exe 2352 schtasks.exe 1708 schtasks.exe 776 schtasks.exe 2628 schtasks.exe 4616 schtasks.exe 4704 schtasks.exe 1480 schtasks.exe 5088 schtasks.exe 680 schtasks.exe 996 schtasks.exe 1784 schtasks.exe 536 schtasks.exe 2148 schtasks.exe 368 schtasks.exe 1388 schtasks.exe 3532 schtasks.exe 5012 schtasks.exe 4800 schtasks.exe 2956 schtasks.exe 3312 schtasks.exe 5060 schtasks.exe 3356 schtasks.exe 4100 schtasks.exe 4236 schtasks.exe 3856 schtasks.exe 212 schtasks.exe 4756 schtasks.exe 2844 schtasks.exe 1884 schtasks.exe 2608 schtasks.exe 392 schtasks.exe 1576 schtasks.exe 684 schtasks.exe 4160 schtasks.exe 3172 schtasks.exe 3964 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2356 WinLatency.exe 2356 WinLatency.exe 2356 WinLatency.exe 2356 WinLatency.exe 2356 WinLatency.exe 2356 WinLatency.exe 2356 WinLatency.exe 220 conhost.exe 220 conhost.exe 220 conhost.exe 220 conhost.exe 220 conhost.exe 220 conhost.exe 220 conhost.exe 220 conhost.exe 220 conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 220 conhost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1428 4944035addbf7b1db7cf58fca9cda3050fbf87c3b5ca18dc124ceae5767a8bea.exe Token: SeDebugPrivilege 2356 WinLatency.exe Token: SeDebugPrivilege 220 conhost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1428 wrote to memory of 4920 1428 4944035addbf7b1db7cf58fca9cda3050fbf87c3b5ca18dc124ceae5767a8bea.exe 84 PID 1428 wrote to memory of 4920 1428 4944035addbf7b1db7cf58fca9cda3050fbf87c3b5ca18dc124ceae5767a8bea.exe 84 PID 1428 wrote to memory of 4920 1428 4944035addbf7b1db7cf58fca9cda3050fbf87c3b5ca18dc124ceae5767a8bea.exe 84 PID 4920 wrote to memory of 4924 4920 0xias2ag.kcz.exe 85 PID 4920 wrote to memory of 4924 4920 0xias2ag.kcz.exe 85 PID 4920 wrote to memory of 4924 4920 0xias2ag.kcz.exe 85 PID 4924 wrote to memory of 2632 4924 WScript.exe 87 PID 4924 wrote to memory of 2632 4924 WScript.exe 87 PID 4924 wrote to memory of 2632 4924 WScript.exe 87 PID 2632 wrote to memory of 2356 2632 cmd.exe 89 PID 2632 wrote to memory of 2356 2632 cmd.exe 89 PID 2356 wrote to memory of 5008 2356 WinLatency.exe 134 PID 2356 wrote to memory of 5008 2356 WinLatency.exe 134 PID 5008 wrote to memory of 1704 5008 cmd.exe 136 PID 5008 wrote to memory of 1704 5008 cmd.exe 136 PID 5008 wrote to memory of 220 5008 cmd.exe 145 PID 5008 wrote to memory of 220 5008 cmd.exe 145 PID 220 wrote to memory of 3404 220 conhost.exe 146 PID 220 wrote to memory of 3404 220 conhost.exe 146 PID 220 wrote to memory of 4576 220 conhost.exe 147 PID 220 wrote to memory of 4576 220 conhost.exe 147 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4944035addbf7b1db7cf58fca9cda3050fbf87c3b5ca18dc124ceae5767a8bea.exe"C:\Users\Admin\AppData\Local\Temp\4944035addbf7b1db7cf58fca9cda3050fbf87c3b5ca18dc124ceae5767a8bea.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\0xias2ag.kcz.exe"C:\Users\Admin\AppData\Local\Temp\0xias2ag.kcz.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\WinSattl\H4iFvhalfT9t12Rug.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WinSattl\9Jks4Q9248ljrax16iPG1ojfLKPqxh.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\WinSattl\WinLatency.exe"C:\Users\Admin\AppData\Local\Temp\WinSattl\WinLatency.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\P3GghPG36P.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:1704
-
-
C:\Program Files\Windows Mail\conhost.exe"C:\Program Files\Windows Mail\conhost.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\51cd92f8-4a45-4773-b340-10045faff33f.vbs"8⤵PID:3404
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\31d3319a-ce71-4aaa-aede-757487181509.vbs"8⤵PID:4576
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Windows\IME\IMEKR\HELP\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\IME\IMEKR\HELP\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Windows\IME\IMEKR\HELP\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\Windows\Offline Web Pages\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\Offline Web Pages\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Windows\Offline Web Pages\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Mail\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Mail\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Windows\Registration\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Registration\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\Registration\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WinLatencyW" /sc MINUTE /mo 11 /tr "'C:\Windows\Web\4K\WinLatency.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WinLatency" /sc ONLOGON /tr "'C:\Windows\Web\4K\WinLatency.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WinLatencyW" /sc MINUTE /mo 8 /tr "'C:\Windows\Web\4K\WinLatency.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Google\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\Google\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Google\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Mail\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Mail\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Internet Explorer\es-ES\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\es-ES\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Internet Explorer\es-ES\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD524ab440ae1ee72bb5abb8c40dbc4ff4c
SHA13f2331bcebb4bda4a9ecf80f448112c044af0aa7
SHA256b9f480785e10ba5dfc0cc4975393f93f00de372e77d667c4be323c7da20c6841
SHA5122b48f5cf2622f3db2010c21df840b4382b6bfbd3ff83e7f0fe6ac7a3f3374054df29b77183d8fed10113928fd2f2abd64a2966f8d714de983759b5d33ecdc62e
-
Filesize
493B
MD58b1816c33589f2766970d1425fdf6634
SHA1d47fc335b6db7ccad4ec5ccf03347829160a9ee4
SHA256d03eedef750d2cd96c36b70fe0840d9d63de3947c6882acc249c4f9e9a2d1749
SHA512e3e689c9c3eef314eecd0851145505c0c4cd97a334c6cf7a69c9c6088b32d509f04ad178d5276e861f686a0a5688b3de5b3c7ccc39fe9888e30f0e4b1962a38a
-
Filesize
716B
MD52d2c856433767817f8a1964184faf676
SHA1cd74902f13c2da24f2c8d80ea0bd04e3530d3513
SHA25627125f9869b234766b6c0d0b62f092a1a854856f2e18dc37848f17fca53f74af
SHA5126541fdcb24a10629944331d2ebe92b50a245787994ef23126705016f1e59298eadf9327aa2738975d3aaff1f77b8a45f7a5023419175d33ea992a745618d5b6a
-
Filesize
206B
MD59f267e4f6fae72f3c2f8cc34e8e61a81
SHA190c159de0261ee9fd16fca4d39be4be911a4008d
SHA2565650ed0f25e35a095d2de6ce16b0a950caff9b0aee149981e3e8a2a527dd2998
SHA512838b8197792e29c4ee47d8b7d78a8e7b6f8e9d6ca4466de19ebfee842d0fce3b4bdc1ac7b54b658a14a75be01cbce93da3a6ec1280ae1ae21164cb8a37b2439c
-
Filesize
32B
MD5379e341777be6ff907435c23e8820088
SHA1e14dd5b865c6b697c2a76ba49ac90a1b98986bb0
SHA256c63d7ef8bbd2e8fa2c18fc52fbef8150ea31bd89e0f793a08f60b0468ed50df6
SHA512df6551d2719418fe3b1f564d59139cf67e5b3a878a3179dbd6fca90d699646e18817bbe62ccba456cbe5d8c67ee9b493abfc85afbaf36a9846bf79dbdf9b2738
-
Filesize
219B
MD57e92ca966c14c0e729731a0afa60e5c2
SHA1ae5c63fa752839a794e46112cd780120f352ee71
SHA256acd2acbb0fd9b50b061a8252f85f8e2ebba9f32a1f74d157b5061e6e7ceed384
SHA512aab41b66c085dfb53b472bd8ef3b987b667df6c8f819396aec44f99cfbb20731f6e90b931eb3d5c2c1eb0d9c7ee0bec5465536c3397f6f0b90c719dfc694a715
-
Filesize
872KB
MD5b26ea50de8f1da57b78e045ec904e19a
SHA18137c1fe0633482dd4c42bf2abb7c3b042877e38
SHA25678fee25cc75affb005b5ca205328f5e0e44ba153e018fad0a7720c96940f5b9f
SHA51229b76a3a8cb0435013e46198bab2755f3de84473cfc8a8b3d26dd3e2b05eec0bb1409e9cb43235d4fd6bbe5d30c1978f58acba89d9172e575d94262dc11d1ffe