Analysis
-
max time kernel
120s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 04:43
Static task
static1
Behavioral task
behavioral1
Sample
f0f558d279b1bc6708a1e95e8aa611c2824ee18be18e9676a236130d649e6db6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0f558d279b1bc6708a1e95e8aa611c2824ee18be18e9676a236130d649e6db6.exe
Resource
win10v2004-20241007-en
General
-
Target
f0f558d279b1bc6708a1e95e8aa611c2824ee18be18e9676a236130d649e6db6.exe
-
Size
1.8MB
-
MD5
d1c01e3ece918fce1cee14204b9a91af
-
SHA1
888e49d8716e5d283c3a16a2cdaf37a9c09c098e
-
SHA256
f0f558d279b1bc6708a1e95e8aa611c2824ee18be18e9676a236130d649e6db6
-
SHA512
1263bad7fd1911d6689734477bd2b90b718d4496c69c1ef173e411443929d40317e798cdf1370446b7b6bd14d269ef8edbe197af4f2590f30fac45fdb0e8bd6e
-
SSDEEP
49152:IBJTl4fxzc8TMk++HUwh42sDnaeQdbJU7Z:yj4hcEM54UG43naZs
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\services.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\services.exe\", \"C:\\Users\\Default\\NetHood\\dllhost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\services.exe\", \"C:\\Users\\Default\\NetHood\\dllhost.exe\", \"C:\\Program Files (x86)\\Google\\CrashReports\\conhost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\services.exe\", \"C:\\Users\\Default\\NetHood\\dllhost.exe\", \"C:\\Program Files (x86)\\Google\\CrashReports\\conhost.exe\", \"C:\\Users\\All Users\\Desktop\\services.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\services.exe\", \"C:\\Users\\Default\\NetHood\\dllhost.exe\", \"C:\\Program Files (x86)\\Google\\CrashReports\\conhost.exe\", \"C:\\Users\\All Users\\Desktop\\services.exe\", \"C:\\Users\\Public\\Favorites\\Idle.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\services.exe\", \"C:\\Users\\Default\\NetHood\\dllhost.exe\", \"C:\\Program Files (x86)\\Google\\CrashReports\\conhost.exe\", \"C:\\Users\\All Users\\Desktop\\services.exe\", \"C:\\Users\\Public\\Favorites\\Idle.exe\", \"C:\\fontwin\\MsServerHost.exe\"" MsServerHost.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 296 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 852 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 544 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2320 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 580 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1768 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2400 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2520 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2296 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1896 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1912 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 2372 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1228 2372 schtasks.exe 34 -
Command and Scripting Interpreter: PowerShell 1 TTPs 19 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2844 powershell.exe 1808 powershell.exe 848 powershell.exe 1564 powershell.exe 2668 powershell.exe 1380 powershell.exe 2300 powershell.exe 892 powershell.exe 1560 powershell.exe 856 powershell.exe 1260 powershell.exe 1888 powershell.exe 1360 powershell.exe 1588 powershell.exe 1820 powershell.exe 616 powershell.exe 788 powershell.exe 776 powershell.exe 1680 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2580 MsServerHost.exe 444 Idle.exe -
Loads dropped DLL 2 IoCs
pid Process 2624 cmd.exe 2624 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MsServerHost = "\"C:\\fontwin\\MsServerHost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Program Files\\Uninstall Information\\services.exe\"" MsServerHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Program Files (x86)\\Google\\CrashReports\\conhost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Users\\All Users\\Desktop\\services.exe\"" MsServerHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\MsServerHost = "\"C:\\fontwin\\MsServerHost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Users\\All Users\\Desktop\\services.exe\"" MsServerHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Public\\Favorites\\Idle.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Public\\Favorites\\Idle.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Program Files\\Uninstall Information\\services.exe\"" MsServerHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Default\\NetHood\\dllhost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Default\\NetHood\\dllhost.exe\"" MsServerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Program Files (x86)\\Google\\CrashReports\\conhost.exe\"" MsServerHost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCD4BB004373324F4B83782A62BB471BF4.TMP csc.exe File created \??\c:\Windows\System32\byyuy-.exe csc.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Google\CrashReports\conhost.exe MsServerHost.exe File created C:\Program Files (x86)\Google\CrashReports\088424020bedd6 MsServerHost.exe File created C:\Program Files\Uninstall Information\services.exe MsServerHost.exe File created C:\Program Files\Uninstall Information\c5b4cb5e9653cc MsServerHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0f558d279b1bc6708a1e95e8aa611c2824ee18be18e9676a236130d649e6db6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 296 schtasks.exe 1164 schtasks.exe 2320 schtasks.exe 2512 schtasks.exe 1768 schtasks.exe 2400 schtasks.exe 2520 schtasks.exe 852 schtasks.exe 2044 schtasks.exe 1740 schtasks.exe 1896 schtasks.exe 2296 schtasks.exe 1912 schtasks.exe 1520 schtasks.exe 1228 schtasks.exe 544 schtasks.exe 2160 schtasks.exe 580 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe 2580 MsServerHost.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2580 MsServerHost.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeDebugPrivilege 1588 powershell.exe Token: SeDebugPrivilege 616 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeDebugPrivilege 1564 powershell.exe Token: SeDebugPrivilege 1808 powershell.exe Token: SeDebugPrivilege 1888 powershell.exe Token: SeDebugPrivilege 856 powershell.exe Token: SeDebugPrivilege 1820 powershell.exe Token: SeDebugPrivilege 1680 powershell.exe Token: SeDebugPrivilege 2300 powershell.exe Token: SeDebugPrivilege 788 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 1380 powershell.exe Token: SeDebugPrivilege 1560 powershell.exe Token: SeDebugPrivilege 1260 powershell.exe Token: SeDebugPrivilege 848 powershell.exe Token: SeDebugPrivilege 1360 powershell.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeDebugPrivilege 444 Idle.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2720 2336 f0f558d279b1bc6708a1e95e8aa611c2824ee18be18e9676a236130d649e6db6.exe 30 PID 2336 wrote to memory of 2720 2336 f0f558d279b1bc6708a1e95e8aa611c2824ee18be18e9676a236130d649e6db6.exe 30 PID 2336 wrote to memory of 2720 2336 f0f558d279b1bc6708a1e95e8aa611c2824ee18be18e9676a236130d649e6db6.exe 30 PID 2336 wrote to memory of 2720 2336 f0f558d279b1bc6708a1e95e8aa611c2824ee18be18e9676a236130d649e6db6.exe 30 PID 2720 wrote to memory of 2624 2720 WScript.exe 31 PID 2720 wrote to memory of 2624 2720 WScript.exe 31 PID 2720 wrote to memory of 2624 2720 WScript.exe 31 PID 2720 wrote to memory of 2624 2720 WScript.exe 31 PID 2624 wrote to memory of 2580 2624 cmd.exe 33 PID 2624 wrote to memory of 2580 2624 cmd.exe 33 PID 2624 wrote to memory of 2580 2624 cmd.exe 33 PID 2624 wrote to memory of 2580 2624 cmd.exe 33 PID 2580 wrote to memory of 1956 2580 MsServerHost.exe 38 PID 2580 wrote to memory of 1956 2580 MsServerHost.exe 38 PID 2580 wrote to memory of 1956 2580 MsServerHost.exe 38 PID 1956 wrote to memory of 1932 1956 csc.exe 40 PID 1956 wrote to memory of 1932 1956 csc.exe 40 PID 1956 wrote to memory of 1932 1956 csc.exe 40 PID 2580 wrote to memory of 892 2580 MsServerHost.exe 57 PID 2580 wrote to memory of 892 2580 MsServerHost.exe 57 PID 2580 wrote to memory of 892 2580 MsServerHost.exe 57 PID 2580 wrote to memory of 2844 2580 MsServerHost.exe 58 PID 2580 wrote to memory of 2844 2580 MsServerHost.exe 58 PID 2580 wrote to memory of 2844 2580 MsServerHost.exe 58 PID 2580 wrote to memory of 848 2580 MsServerHost.exe 59 PID 2580 wrote to memory of 848 2580 MsServerHost.exe 59 PID 2580 wrote to memory of 848 2580 MsServerHost.exe 59 PID 2580 wrote to memory of 1808 2580 MsServerHost.exe 60 PID 2580 wrote to memory of 1808 2580 MsServerHost.exe 60 PID 2580 wrote to memory of 1808 2580 MsServerHost.exe 60 PID 2580 wrote to memory of 1588 2580 MsServerHost.exe 61 PID 2580 wrote to memory of 1588 2580 MsServerHost.exe 61 PID 2580 wrote to memory of 1588 2580 MsServerHost.exe 61 PID 2580 wrote to memory of 1564 2580 MsServerHost.exe 62 PID 2580 wrote to memory of 1564 2580 MsServerHost.exe 62 PID 2580 wrote to memory of 1564 2580 MsServerHost.exe 62 PID 2580 wrote to memory of 1680 2580 MsServerHost.exe 63 PID 2580 wrote to memory of 1680 2580 MsServerHost.exe 63 PID 2580 wrote to memory of 1680 2580 MsServerHost.exe 63 PID 2580 wrote to memory of 1560 2580 MsServerHost.exe 64 PID 2580 wrote to memory of 1560 2580 MsServerHost.exe 64 PID 2580 wrote to memory of 1560 2580 MsServerHost.exe 64 PID 2580 wrote to memory of 856 2580 MsServerHost.exe 65 PID 2580 wrote to memory of 856 2580 MsServerHost.exe 65 PID 2580 wrote to memory of 856 2580 MsServerHost.exe 65 PID 2580 wrote to memory of 2668 2580 MsServerHost.exe 66 PID 2580 wrote to memory of 2668 2580 MsServerHost.exe 66 PID 2580 wrote to memory of 2668 2580 MsServerHost.exe 66 PID 2580 wrote to memory of 1260 2580 MsServerHost.exe 67 PID 2580 wrote to memory of 1260 2580 MsServerHost.exe 67 PID 2580 wrote to memory of 1260 2580 MsServerHost.exe 67 PID 2580 wrote to memory of 1888 2580 MsServerHost.exe 68 PID 2580 wrote to memory of 1888 2580 MsServerHost.exe 68 PID 2580 wrote to memory of 1888 2580 MsServerHost.exe 68 PID 2580 wrote to memory of 1380 2580 MsServerHost.exe 69 PID 2580 wrote to memory of 1380 2580 MsServerHost.exe 69 PID 2580 wrote to memory of 1380 2580 MsServerHost.exe 69 PID 2580 wrote to memory of 2300 2580 MsServerHost.exe 70 PID 2580 wrote to memory of 2300 2580 MsServerHost.exe 70 PID 2580 wrote to memory of 2300 2580 MsServerHost.exe 70 PID 2580 wrote to memory of 1360 2580 MsServerHost.exe 71 PID 2580 wrote to memory of 1360 2580 MsServerHost.exe 71 PID 2580 wrote to memory of 1360 2580 MsServerHost.exe 71 PID 2580 wrote to memory of 1820 2580 MsServerHost.exe 72 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0f558d279b1bc6708a1e95e8aa611c2824ee18be18e9676a236130d649e6db6.exe"C:\Users\Admin\AppData\Local\Temp\f0f558d279b1bc6708a1e95e8aa611c2824ee18be18e9676a236130d649e6db6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\fontwin\rjeG9jpaqkoGYbXQiCixJVHPtViWeFHmB5.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\fontwin\SCfgtLybPKjlpPh39WWFnP7oUkboktfnsRDnMjyFOdFfzldEyFoe.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\fontwin\MsServerHost.exe"C:\fontwin/MsServerHost.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\a3ee1ekh\a3ee1ekh.cmdline"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9000.tmp" "c:\Windows\System32\CSCD4BB004373324F4B83782A62BB471BF4.TMP"6⤵PID:1932
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/fontwin/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Uninstall Information\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\NetHood\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\CrashReports\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Desktop\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Favorites\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\fontwin\MsServerHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ynFfJcXw4B.bat"5⤵PID:704
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:1060
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2944
-
-
C:\Users\Public\Favorites\Idle.exe"C:\Users\Public\Favorites\Idle.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Program Files\Uninstall Information\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Program Files\Uninstall Information\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Users\Default\NetHood\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default\NetHood\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\Default\NetHood\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Google\CrashReports\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Google\CrashReports\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Desktop\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\All Users\Desktop\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Desktop\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Favorites\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Public\Favorites\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Favorites\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsServerHostM" /sc MINUTE /mo 13 /tr "'C:\fontwin\MsServerHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsServerHost" /sc ONLOGON /tr "'C:\fontwin\MsServerHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsServerHostM" /sc MINUTE /mo 8 /tr "'C:\fontwin\MsServerHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1228
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e75b10692dd635b6591ac36208cf48e6
SHA12265723f3161c75448e06f14cc191334a4bf8845
SHA256ab7fbff7c565157da90e8f63f318a03f508d0a738eca8162802296cf33f94bc2
SHA51260363090717c8ec2336d973e911ac623640fa9b2370cda951d8b93bbf8b341e87ec8b75cdaac90e1b0ced71f0fc3842fcddc3f01be0ca82d31d41121fbc7cac0
-
Filesize
210B
MD5d36a90ec5cecba310cf8865293b31740
SHA1e87e6253acfe0a73859cb320964b19e12f0e0050
SHA256e21c06afd5a75dac7fa00a457aba7fdf20252ee5d9847a1e8e0ece65dca032c4
SHA512aa124b7a806716fad58e7d308355fa9bf095783218900172aead75ad35bd7d8375e1f707bf420b9c69dbfbd0097ae7a41c08d0df4971b9216c4bf79b38f91ee6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD55e215b4b2dbabc4c12128295678c0703
SHA18b6d9c0f22454ac2505cc97ac2d1e59de5376e5d
SHA25685f09803195d3343514a455d99b78da6d8f9b2a57d98966f13c5775b97acdfad
SHA512f7f9cd4bbad6beca69582d1c8131242fea8f9eea020746461afbead37980ea4c411d337078d367de2ce07aab19cc70e70bb7f6d7f07a1b1a1d56bbdc2cf2445b
-
Filesize
79B
MD506def1a66d18e2cb54c3feb3e338e852
SHA1deea78d6baf993c87a4be23895c0ac97be3a58e5
SHA256050561c2a9a611410c1194e5dea95982410c21c13e6a1b55d0df5c19fb4d3d2f
SHA512a3769d9af6fdf50c8a86707cf6ced77673e7c7d0471c8102777adf5a556e9ee1598941596fd6acd198c84e7900205a67503209e95e9a4f8ea7f139014e8ba93f
-
Filesize
238B
MD5c40860c6355fad694d0759ae23dd3439
SHA1eb61967cd1502160c1e2e219690cf0b7f91cc94e
SHA256b4c7379240810d664b2bdd60e093b4203134eff9c42de2720b0cd287af1d74ca
SHA512ca5323cf17932235cce0c83bc82efa25dd88c0c181b1cddc82149690531d26a0c948ec4d33435ccdf95cc1884efe163703df878ecc30ccc90ecd85083d4d4dfc
-
Filesize
383B
MD581a9d945a6dcb28fc4a87e4dc0bbc377
SHA1a357b641f8a38537c72ffd1c5a4510772e2b4946
SHA256f4f5c6853ec6909d8c6b49a93ef55f6b36c3baadfcb89920d5d903ee72bbb93d
SHA512c2ec41b3dc5482b3ce5276524092e47fc7f40661bf85093f19faf9479e12f6e1878eb1548a837f6870948580a6d457074e6d4d84d28ee9ff130ee0ec1cb9c57e
-
Filesize
235B
MD57cec07420c27db6898fc54215df6b5eb
SHA177cabea917974e90b95cd096532af3bed5f2a2e1
SHA256b3351d9e5a0b61b594f54c798681db5d82af1ea8c506796c4c84a6158129fe7d
SHA5126e8b18ae263cfc15f8f2aa7c998a1b6d8cd36cc3f317dbda2d66f5e2d415d10fd2df54b04643343f5f49a7c6565bad198708d204ad274b128eec4ebc0dd8cbb5
-
Filesize
1KB
MD5078586b266e519b5c113064d7a0bf45c
SHA1a9395c0ef35add5c75591ebb94c85c1f33f408bf
SHA256ccf292ff9f142b204ad4f4481a044ba8f9ab274305dcb604bf0b8ae91819ab1e
SHA5125b8eb6aad62657309088c4668d633c2aa6324d4824ec32c3c5e133df0a5493a4342c980e077ba565f3aab29c58f95c8db7195415a1e554384405c1457730f959
-
Filesize
1.9MB
MD56a720688eb9d2f5c2cfd4761f969063b
SHA15ee46b7fd8f41c79e3df31feede20c518307d52a
SHA2567be4d5853d99295ba22450e935a9ab99861cfbe5ecc56dab500161c5fa6a8d8b
SHA5128a9bee8056817fdd26f41202ceae21c4dd720b20de699f28ec6dbbf70ad6566f4ed394d34cbe640374cf970ccb4f4746fe416f2c7bdec19864305c9878d489c0