Analysis
-
max time kernel
112s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
aedfa77790fe7a60cffddc7dfd4afa0f6fdb858965df2850ce418b4428d92a99N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aedfa77790fe7a60cffddc7dfd4afa0f6fdb858965df2850ce418b4428d92a99N.exe
Resource
win10v2004-20241007-en
General
-
Target
aedfa77790fe7a60cffddc7dfd4afa0f6fdb858965df2850ce418b4428d92a99N.exe
-
Size
1.8MB
-
MD5
5c218a3293314b8e13e89212d24e7da0
-
SHA1
9ff5c504f253730e1d6a15ca1c655c3882ecfbae
-
SHA256
aedfa77790fe7a60cffddc7dfd4afa0f6fdb858965df2850ce418b4428d92a99
-
SHA512
4985f19581a8fc670dde876199a1603fcb1ece427b8c0544b9cf369568fc81ee81a4e2f1a3cbf7160b87a8590917b9b4c8dc8268c5d3ce988c3a251ece047f44
-
SSDEEP
49152:IBJTl4fxzc8TMk++HUwh42sDnaeQdbJU7h:yj4hcEM54UG43naZs
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\fontdrvhost.exe\", \"C:\\fontwin\\winlogon.exe\", \"C:\\Program Files\\Microsoft Office\\root\\rsod\\TextInputHost.exe\", \"C:\\Users\\Admin\\Templates\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Mail\\OfficeClickToRun.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\fontdrvhost.exe\", \"C:\\fontwin\\winlogon.exe\", \"C:\\Program Files\\Microsoft Office\\root\\rsod\\TextInputHost.exe\", \"C:\\Users\\Admin\\Templates\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Mail\\OfficeClickToRun.exe\", \"C:\\fontwin\\MsServerHost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\fontdrvhost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\fontdrvhost.exe\", \"C:\\fontwin\\winlogon.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\fontdrvhost.exe\", \"C:\\fontwin\\winlogon.exe\", \"C:\\Program Files\\Microsoft Office\\root\\rsod\\TextInputHost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\fontdrvhost.exe\", \"C:\\fontwin\\winlogon.exe\", \"C:\\Program Files\\Microsoft Office\\root\\rsod\\TextInputHost.exe\", \"C:\\Users\\Admin\\Templates\\fontdrvhost.exe\"" MsServerHost.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1852 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2352 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1960 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3300 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3968 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1168 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4688 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3776 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3128 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5096 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2520 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 540 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 892 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3260 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4132 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 2996 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1800 2996 schtasks.exe 86 -
Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3664 powershell.exe 3564 powershell.exe 4848 powershell.exe 3140 powershell.exe 2908 powershell.exe 3124 powershell.exe 5116 powershell.exe 2464 powershell.exe 2076 powershell.exe 3056 powershell.exe 1620 powershell.exe 3964 powershell.exe 4040 powershell.exe 1420 powershell.exe 4948 powershell.exe 2004 powershell.exe 3148 powershell.exe 1136 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation aedfa77790fe7a60cffddc7dfd4afa0f6fdb858965df2850ce418b4428d92a99N.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation MsServerHost.exe -
Executes dropped EXE 2 IoCs
pid Process 560 MsServerHost.exe 5904 OfficeClickToRun.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MsServerHost = "\"C:\\fontwin\\MsServerHost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\fontdrvhost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\fontdrvhost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\fontwin\\winlogon.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\fontwin\\winlogon.exe\"" MsServerHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Program Files\\Microsoft Office\\root\\rsod\\TextInputHost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Users\\Admin\\Templates\\fontdrvhost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files (x86)\\Windows Mail\\OfficeClickToRun.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MsServerHost = "\"C:\\fontwin\\MsServerHost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Program Files\\Microsoft Office\\root\\rsod\\TextInputHost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Users\\Admin\\Templates\\fontdrvhost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files (x86)\\Windows Mail\\OfficeClickToRun.exe\"" MsServerHost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC53C35D7355EE4410BD735483E01559F4.TMP csc.exe File created \??\c:\Windows\System32\enb1sa.exe csc.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\rsod\TextInputHost.exe MsServerHost.exe File created C:\Program Files\Microsoft Office\root\rsod\22eafd247d37c3 MsServerHost.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\fontdrvhost.exe MsServerHost.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\5b884080fd4f94 MsServerHost.exe File created C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe MsServerHost.exe File opened for modification C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe MsServerHost.exe File created C:\Program Files (x86)\Windows Mail\e6c9b481da804f MsServerHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aedfa77790fe7a60cffddc7dfd4afa0f6fdb858965df2850ce418b4428d92a99N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings aedfa77790fe7a60cffddc7dfd4afa0f6fdb858965df2850ce418b4428d92a99N.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings MsServerHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3776 schtasks.exe 2520 schtasks.exe 1852 schtasks.exe 4688 schtasks.exe 3128 schtasks.exe 540 schtasks.exe 892 schtasks.exe 2352 schtasks.exe 3300 schtasks.exe 1480 schtasks.exe 4132 schtasks.exe 2712 schtasks.exe 1800 schtasks.exe 1960 schtasks.exe 3968 schtasks.exe 3260 schtasks.exe 1168 schtasks.exe 5096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe 560 MsServerHost.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 560 MsServerHost.exe Token: SeDebugPrivilege 3564 powershell.exe Token: SeDebugPrivilege 1420 powershell.exe Token: SeDebugPrivilege 3148 powershell.exe Token: SeDebugPrivilege 2004 powershell.exe Token: SeDebugPrivilege 4948 powershell.exe Token: SeDebugPrivilege 2076 powershell.exe Token: SeDebugPrivilege 2908 powershell.exe Token: SeDebugPrivilege 1136 powershell.exe Token: SeDebugPrivilege 5116 powershell.exe Token: SeDebugPrivilege 4848 powershell.exe Token: SeDebugPrivilege 1620 powershell.exe Token: SeDebugPrivilege 3056 powershell.exe Token: SeDebugPrivilege 3664 powershell.exe Token: SeDebugPrivilege 2464 powershell.exe Token: SeDebugPrivilege 3964 powershell.exe Token: SeDebugPrivilege 3124 powershell.exe Token: SeDebugPrivilege 3140 powershell.exe Token: SeDebugPrivilege 4040 powershell.exe Token: SeDebugPrivilege 5904 OfficeClickToRun.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 372 wrote to memory of 3876 372 aedfa77790fe7a60cffddc7dfd4afa0f6fdb858965df2850ce418b4428d92a99N.exe 82 PID 372 wrote to memory of 3876 372 aedfa77790fe7a60cffddc7dfd4afa0f6fdb858965df2850ce418b4428d92a99N.exe 82 PID 372 wrote to memory of 3876 372 aedfa77790fe7a60cffddc7dfd4afa0f6fdb858965df2850ce418b4428d92a99N.exe 82 PID 3876 wrote to memory of 4300 3876 WScript.exe 90 PID 3876 wrote to memory of 4300 3876 WScript.exe 90 PID 3876 wrote to memory of 4300 3876 WScript.exe 90 PID 4300 wrote to memory of 560 4300 cmd.exe 92 PID 4300 wrote to memory of 560 4300 cmd.exe 92 PID 560 wrote to memory of 64 560 MsServerHost.exe 96 PID 560 wrote to memory of 64 560 MsServerHost.exe 96 PID 64 wrote to memory of 3452 64 csc.exe 98 PID 64 wrote to memory of 3452 64 csc.exe 98 PID 560 wrote to memory of 4040 560 MsServerHost.exe 114 PID 560 wrote to memory of 4040 560 MsServerHost.exe 114 PID 560 wrote to memory of 3148 560 MsServerHost.exe 115 PID 560 wrote to memory of 3148 560 MsServerHost.exe 115 PID 560 wrote to memory of 2004 560 MsServerHost.exe 116 PID 560 wrote to memory of 2004 560 MsServerHost.exe 116 PID 560 wrote to memory of 3564 560 MsServerHost.exe 117 PID 560 wrote to memory of 3564 560 MsServerHost.exe 117 PID 560 wrote to memory of 4848 560 MsServerHost.exe 118 PID 560 wrote to memory of 4848 560 MsServerHost.exe 118 PID 560 wrote to memory of 2464 560 MsServerHost.exe 119 PID 560 wrote to memory of 2464 560 MsServerHost.exe 119 PID 560 wrote to memory of 1420 560 MsServerHost.exe 120 PID 560 wrote to memory of 1420 560 MsServerHost.exe 120 PID 560 wrote to memory of 2076 560 MsServerHost.exe 121 PID 560 wrote to memory of 2076 560 MsServerHost.exe 121 PID 560 wrote to memory of 4948 560 MsServerHost.exe 122 PID 560 wrote to memory of 4948 560 MsServerHost.exe 122 PID 560 wrote to memory of 3140 560 MsServerHost.exe 123 PID 560 wrote to memory of 3140 560 MsServerHost.exe 123 PID 560 wrote to memory of 3056 560 MsServerHost.exe 124 PID 560 wrote to memory of 3056 560 MsServerHost.exe 124 PID 560 wrote to memory of 2908 560 MsServerHost.exe 125 PID 560 wrote to memory of 2908 560 MsServerHost.exe 125 PID 560 wrote to memory of 1620 560 MsServerHost.exe 126 PID 560 wrote to memory of 1620 560 MsServerHost.exe 126 PID 560 wrote to memory of 3664 560 MsServerHost.exe 127 PID 560 wrote to memory of 3664 560 MsServerHost.exe 127 PID 560 wrote to memory of 3124 560 MsServerHost.exe 128 PID 560 wrote to memory of 3124 560 MsServerHost.exe 128 PID 560 wrote to memory of 1136 560 MsServerHost.exe 129 PID 560 wrote to memory of 1136 560 MsServerHost.exe 129 PID 560 wrote to memory of 5116 560 MsServerHost.exe 130 PID 560 wrote to memory of 5116 560 MsServerHost.exe 130 PID 560 wrote to memory of 3964 560 MsServerHost.exe 131 PID 560 wrote to memory of 3964 560 MsServerHost.exe 131 PID 560 wrote to memory of 5004 560 MsServerHost.exe 149 PID 560 wrote to memory of 5004 560 MsServerHost.exe 149 PID 5004 wrote to memory of 5220 5004 cmd.exe 152 PID 5004 wrote to memory of 5220 5004 cmd.exe 152 PID 5004 wrote to memory of 5576 5004 cmd.exe 153 PID 5004 wrote to memory of 5576 5004 cmd.exe 153 PID 5004 wrote to memory of 5904 5004 cmd.exe 155 PID 5004 wrote to memory of 5904 5004 cmd.exe 155 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aedfa77790fe7a60cffddc7dfd4afa0f6fdb858965df2850ce418b4428d92a99N.exe"C:\Users\Admin\AppData\Local\Temp\aedfa77790fe7a60cffddc7dfd4afa0f6fdb858965df2850ce418b4428d92a99N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\fontwin\rjeG9jpaqkoGYbXQiCixJVHPtViWeFHmB5.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\fontwin\SCfgtLybPKjlpPh39WWFnP7oUkboktfnsRDnMjyFOdFfzldEyFoe.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\fontwin\MsServerHost.exe"C:\fontwin/MsServerHost.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ruulmwsm\ruulmwsm.cmdline"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF3E5.tmp" "c:\Windows\System32\CSC53C35D7355EE4410BD735483E01559F4.TMP"6⤵PID:3452
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/fontwin/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\fontwin\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office\root\rsod\TextInputHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Templates\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\fontwin\MsServerHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gXH3SQHf3r.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:5220
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:5576
-
-
C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe"C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5904
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\fontwin\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\fontwin\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\fontwin\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office\root\rsod\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\root\rsod\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Program Files\Microsoft Office\root\rsod\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Templates\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Admin\Templates\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Templates\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsServerHostM" /sc MINUTE /mo 8 /tr "'C:\fontwin\MsServerHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsServerHost" /sc ONLOGON /tr "'C:\fontwin\MsServerHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsServerHostM" /sc MINUTE /mo 5 /tr "'C:\fontwin\MsServerHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1800
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5750e4be22a6fdadd7778a388198a9ee3
SHA18feb2054d8a3767833dd972535df54f0c3ab6648
SHA25626209c196c9c45202d27468ea707b2b46f375bb612d50271924a28f9210df6a1
SHA512b0415087dfc32908b449b876b395a607698b0f7b72031916b6fe7c002e4b163ba318b7e85c8ce41f007429e666974c04967bc14345e3f4614e34d94f5c8ae804
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
944B
MD5a8e8360d573a4ff072dcc6f09d992c88
SHA13446774433ceaf0b400073914facab11b98b6807
SHA256bf5e284e8f95122bf75ead61c7e2b40f55c96742b05330b5b1cb7915991df13b
SHA5124ee5167643d82082f57c42616007ef9be57f43f9731921bdf7bca611a914724ad94072d3c8f5b130fa54129e5328ccdebf37ba74339c37deb53e79df5cdf0dbe
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5aaaac7c68d2b7997ed502c26fd9f65c2
SHA17c5a3731300d672bf53c43e2f9e951c745f7fbdf
SHA2568724dc2c3c8e8f17aeefae44a23741b1ea3b43c490fbc52fd61575ffe1cd82bb
SHA512c526febd9430413b48bed976edd9a795793ad1f06c8ff4f6b768b4ad63f4d2f06b9da72d4fcfa7cb9530a64e2dc3554f5ad97fd0ab60129701d175f2724ef1ac
-
Filesize
944B
MD5e448fe0d240184c6597a31d3be2ced58
SHA1372b8d8c19246d3e38cd3ba123cc0f56070f03cd
SHA256c660f0db85a1e7f0f68db19868979bf50bd541531babf77a701e1b1ce5e6a391
SHA5120b7f7eae7700d32b18eee3677cb7f89b46ace717fa7e6b501d6c47d54f15dff7e12b49f5a7d36a6ffe4c16165c7d55162db4f3621db545b6af638035752beab4
-
Filesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
Filesize
1KB
MD57d9988209bef21b28c072d3b94e54423
SHA13a663f79ce1aad3613160b7a37ab31ed8567130c
SHA256c02fb42ec5672f69cee97a7c2db1e6ece9acc83f1714eb6ee27f0bf68a56dc86
SHA51262dbda1d9bac79b71a535d20d94aa61e9309910eafd9d5af4cd8b34d286af90f153231d4564dad52e631a9c0dac8e0da7c1b61657c132598d534a4cc8c6dc09a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
232B
MD564d59c0d5c1a33a0b97e07c2e16b3591
SHA13a8d8d1987bee1c56cd32220cb85097b36775cf6
SHA25613037ce6fbe8fb2eff1f579aafbffd7f2b4b86a1eed61b448d29069bb95fbe5a
SHA5120911b64cf42ca1621b7bf6a214e643deb7d77d2db27d3f357a214e08e8d13557e0e9c7096ff3903749a2eb2b00b1d87f0bea57ea7cb77ef509886eaca52d5fa2
-
Filesize
1.9MB
MD56a720688eb9d2f5c2cfd4761f969063b
SHA15ee46b7fd8f41c79e3df31feede20c518307d52a
SHA2567be4d5853d99295ba22450e935a9ab99861cfbe5ecc56dab500161c5fa6a8d8b
SHA5128a9bee8056817fdd26f41202ceae21c4dd720b20de699f28ec6dbbf70ad6566f4ed394d34cbe640374cf970ccb4f4746fe416f2c7bdec19864305c9878d489c0
-
Filesize
79B
MD506def1a66d18e2cb54c3feb3e338e852
SHA1deea78d6baf993c87a4be23895c0ac97be3a58e5
SHA256050561c2a9a611410c1194e5dea95982410c21c13e6a1b55d0df5c19fb4d3d2f
SHA512a3769d9af6fdf50c8a86707cf6ced77673e7c7d0471c8102777adf5a556e9ee1598941596fd6acd198c84e7900205a67503209e95e9a4f8ea7f139014e8ba93f
-
Filesize
238B
MD5c40860c6355fad694d0759ae23dd3439
SHA1eb61967cd1502160c1e2e219690cf0b7f91cc94e
SHA256b4c7379240810d664b2bdd60e093b4203134eff9c42de2720b0cd287af1d74ca
SHA512ca5323cf17932235cce0c83bc82efa25dd88c0c181b1cddc82149690531d26a0c948ec4d33435ccdf95cc1884efe163703df878ecc30ccc90ecd85083d4d4dfc
-
Filesize
394B
MD5fee0c9e4072facf1d9a47fdb2a6dd36e
SHA13a91d5b5664bb4a4c59a093460eddfe24f4000d9
SHA25623732c109816e45dd3a7ea8c29cfbecffdf51260e04cdbb3fce49d59960a6a0d
SHA512588cc21e53f4d93acd3e51c6edf8a15b9085c8f1067b9fc548aecd58cd277adbaf993efc8d41661ff9861764b1f966baa5552d651713e907b282a9697bc632b2
-
Filesize
235B
MD5cb01f1665e5e79de3c8964f99e9ab69f
SHA136952c8440d0ef55020a59a5b2a237b12612f207
SHA256c68b1674b838ce1672b9d6bd11d90507b6eafb510329b2cbb8ccad66c87be23a
SHA5127e32370d5f808b267540c0aa7426980ae196dbe229fe6e351bc5bef1ebaf0f74011b8922e0fa471a202db43de87c5df36c4c72c007674259c6857540a8cc9ff2
-
Filesize
1KB
MD55984679060d0fc54eba47cead995f65a
SHA1f72bbbba060ac80ac6abedc7b8679e8963f63ebf
SHA2564104fdf5499f0aa7dd161568257acae002620ec385f2ede2072d4f550ecff433
SHA512bc8aadfabe5dbb4e3ea5e07a5ccbddd363400005675acda3e9cb414dc75fb0ba74f41b4a6baf34d42f85a9ae0af7d2418420c78b0c643f7243fe93a49b8140b5