Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe
Resource
win10v2004-20241007-en
General
-
Target
26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe
-
Size
1.5MB
-
MD5
a5fab16bfd5f2f5b2beef03fc634c78b
-
SHA1
e2876e25315d4109734bd0ffa2e3d50db7550f5e
-
SHA256
26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7
-
SHA512
a8efef2e38b32410db153aa3a8db6558a03e9fe73ed930fc37aaf2af2559dbd4a99c90249156884ecdf573498f6d9e8cdcaac0c983f749cdaf831df611925894
-
SSDEEP
24576:0NNUtQhWhtqDfDXQdy+N+gfQqRsgFlDRluQ70eJiVbWpRQ:EzhWhCXQFN+0IEuQgyiVK4
Malware Config
Signatures
-
DcRat 8 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 464 schtasks.exe 3688 schtasks.exe 3560 schtasks.exe 1644 schtasks.exe 2828 schtasks.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\6cb0b6c459d5d3 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 1540 schtasks.exe -
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\dwm.exe\", \"C:\\Documents and Settings\\Registry.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\dwm.exe\", \"C:\\Documents and Settings\\Registry.exe\", \"C:\\Windows\\System32\\msvcp110_win\\SppExtComObj.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\dwm.exe\", \"C:\\Documents and Settings\\Registry.exe\", \"C:\\Windows\\System32\\msvcp110_win\\SppExtComObj.exe\", \"C:\\Windows\\System32\\NgcCtnrSvc\\SppExtComObj.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\dwm.exe\", \"C:\\Documents and Settings\\Registry.exe\", \"C:\\Windows\\System32\\msvcp110_win\\SppExtComObj.exe\", \"C:\\Windows\\System32\\NgcCtnrSvc\\SppExtComObj.exe\", \"C:\\Windows\\System32\\CloudExperienceHostCommon\\RuntimeBroker.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\dwm.exe\", \"C:\\Documents and Settings\\Registry.exe\", \"C:\\Windows\\System32\\msvcp110_win\\SppExtComObj.exe\", \"C:\\Windows\\System32\\NgcCtnrSvc\\SppExtComObj.exe\", \"C:\\Windows\\System32\\CloudExperienceHostCommon\\RuntimeBroker.exe\", \"C:\\Program Files\\Crashpad\\reports\\RuntimeBroker.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\dwm.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe -
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1540 4560 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 464 4560 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3688 4560 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3560 4560 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 4560 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 4560 schtasks.exe 83 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2908 powershell.exe 4496 powershell.exe 1416 powershell.exe 3952 powershell.exe 1748 powershell.exe 3344 powershell.exe 4844 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe -
Checks computer location settings 2 TTPs 18 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dwm.exe -
Executes dropped EXE 17 IoCs
pid Process 1936 dwm.exe 2836 dwm.exe 4528 dwm.exe 1872 dwm.exe 4212 dwm.exe 888 dwm.exe 2212 dwm.exe 548 dwm.exe 2652 dwm.exe 3580 dwm.exe 3564 dwm.exe 312 dwm.exe 1444 dwm.exe 1440 dwm.exe 4568 dwm.exe 1188 dwm.exe 3696 dwm.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Documents and Settings\\Registry.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\System32\\msvcp110_win\\SppExtComObj.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\System32\\NgcCtnrSvc\\SppExtComObj.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\System32\\NgcCtnrSvc\\SppExtComObj.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\CloudExperienceHostCommon\\RuntimeBroker.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\CloudExperienceHostCommon\\RuntimeBroker.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\dwm.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Documents and Settings\\Registry.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\System32\\msvcp110_win\\SppExtComObj.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Crashpad\\reports\\RuntimeBroker.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Crashpad\\reports\\RuntimeBroker.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\dwm.exe\"" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\System32\msvcp110_win\SppExtComObj.exe 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File created C:\Windows\System32\NgcCtnrSvc\SppExtComObj.exe 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File created C:\Windows\System32\CloudExperienceHostCommon\9e8d7a4ca61bd9 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File opened for modification C:\Windows\System32\msvcp110_win\RCXC0A3.tmp 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File opened for modification C:\Windows\System32\msvcp110_win\SppExtComObj.exe 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File opened for modification C:\Windows\System32\NgcCtnrSvc\RCXC2A8.tmp 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File opened for modification C:\Windows\System32\NgcCtnrSvc\SppExtComObj.exe 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File created C:\Windows\System32\msvcp110_win\e1ef82546f0b02 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File created C:\Windows\System32\NgcCtnrSvc\e1ef82546f0b02 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File created C:\Windows\System32\CloudExperienceHostCommon\RuntimeBroker.exe 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File opened for modification C:\Windows\System32\CloudExperienceHostCommon\RCXC51A.tmp 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File opened for modification C:\Windows\System32\CloudExperienceHostCommon\RuntimeBroker.exe 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Crashpad\reports\RuntimeBroker.exe 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File created C:\Program Files\Crashpad\reports\9e8d7a4ca61bd9 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\RCXBBBF.tmp 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File opened for modification C:\Program Files\Crashpad\reports\RCXC78C.tmp 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File opened for modification C:\Program Files\Crashpad\reports\RuntimeBroker.exe 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\6cb0b6c459d5d3 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings dwm.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1540 schtasks.exe 464 schtasks.exe 3688 schtasks.exe 3560 schtasks.exe 1644 schtasks.exe 2828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 3344 powershell.exe 3344 powershell.exe 1748 powershell.exe 3952 powershell.exe 4844 powershell.exe 2908 powershell.exe 1416 powershell.exe 4496 powershell.exe 3952 powershell.exe 3952 powershell.exe 4844 powershell.exe 4844 powershell.exe 1416 powershell.exe 1416 powershell.exe 2908 powershell.exe 2908 powershell.exe 1748 powershell.exe 1748 powershell.exe 4496 powershell.exe 1936 dwm.exe 1936 dwm.exe 1936 dwm.exe 1936 dwm.exe 1936 dwm.exe 1936 dwm.exe 1936 dwm.exe 1936 dwm.exe 1936 dwm.exe 1936 dwm.exe 1936 dwm.exe 1936 dwm.exe 1936 dwm.exe 2836 dwm.exe 2836 dwm.exe 2836 dwm.exe 2836 dwm.exe 2836 dwm.exe 2836 dwm.exe 2836 dwm.exe 2836 dwm.exe 2836 dwm.exe 2836 dwm.exe 2836 dwm.exe 2836 dwm.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Token: SeDebugPrivilege 3344 powershell.exe Token: SeDebugPrivilege 1748 powershell.exe Token: SeDebugPrivilege 3952 powershell.exe Token: SeDebugPrivilege 4844 powershell.exe Token: SeDebugPrivilege 2908 powershell.exe Token: SeDebugPrivilege 1416 powershell.exe Token: SeDebugPrivilege 4496 powershell.exe Token: SeDebugPrivilege 1936 dwm.exe Token: SeDebugPrivilege 2836 dwm.exe Token: SeDebugPrivilege 4528 dwm.exe Token: SeDebugPrivilege 1872 dwm.exe Token: SeDebugPrivilege 4212 dwm.exe Token: SeDebugPrivilege 888 dwm.exe Token: SeDebugPrivilege 2212 dwm.exe Token: SeDebugPrivilege 548 dwm.exe Token: SeDebugPrivilege 2652 dwm.exe Token: SeDebugPrivilege 3580 dwm.exe Token: SeDebugPrivilege 3564 dwm.exe Token: SeDebugPrivilege 312 dwm.exe Token: SeDebugPrivilege 1444 dwm.exe Token: SeDebugPrivilege 1440 dwm.exe Token: SeDebugPrivilege 4568 dwm.exe Token: SeDebugPrivilege 1188 dwm.exe Token: SeDebugPrivilege 3696 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2808 wrote to memory of 1748 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 90 PID 2808 wrote to memory of 1748 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 90 PID 2808 wrote to memory of 3344 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 91 PID 2808 wrote to memory of 3344 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 91 PID 2808 wrote to memory of 4844 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 92 PID 2808 wrote to memory of 4844 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 92 PID 2808 wrote to memory of 2908 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 93 PID 2808 wrote to memory of 2908 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 93 PID 2808 wrote to memory of 4496 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 94 PID 2808 wrote to memory of 4496 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 94 PID 2808 wrote to memory of 1416 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 95 PID 2808 wrote to memory of 1416 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 95 PID 2808 wrote to memory of 3952 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 96 PID 2808 wrote to memory of 3952 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 96 PID 2808 wrote to memory of 4112 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 103 PID 2808 wrote to memory of 4112 2808 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe 103 PID 4112 wrote to memory of 4684 4112 cmd.exe 106 PID 4112 wrote to memory of 4684 4112 cmd.exe 106 PID 4112 wrote to memory of 1936 4112 cmd.exe 110 PID 4112 wrote to memory of 1936 4112 cmd.exe 110 PID 1936 wrote to memory of 4936 1936 dwm.exe 111 PID 1936 wrote to memory of 4936 1936 dwm.exe 111 PID 1936 wrote to memory of 3548 1936 dwm.exe 112 PID 1936 wrote to memory of 3548 1936 dwm.exe 112 PID 4936 wrote to memory of 2836 4936 WScript.exe 118 PID 4936 wrote to memory of 2836 4936 WScript.exe 118 PID 2836 wrote to memory of 1588 2836 dwm.exe 119 PID 2836 wrote to memory of 1588 2836 dwm.exe 119 PID 2836 wrote to memory of 3004 2836 dwm.exe 120 PID 2836 wrote to memory of 3004 2836 dwm.exe 120 PID 1588 wrote to memory of 4528 1588 WScript.exe 125 PID 1588 wrote to memory of 4528 1588 WScript.exe 125 PID 4528 wrote to memory of 2056 4528 dwm.exe 126 PID 4528 wrote to memory of 2056 4528 dwm.exe 126 PID 4528 wrote to memory of 1236 4528 dwm.exe 127 PID 4528 wrote to memory of 1236 4528 dwm.exe 127 PID 2056 wrote to memory of 1872 2056 WScript.exe 131 PID 2056 wrote to memory of 1872 2056 WScript.exe 131 PID 1872 wrote to memory of 3600 1872 dwm.exe 132 PID 1872 wrote to memory of 3600 1872 dwm.exe 132 PID 1872 wrote to memory of 4892 1872 dwm.exe 133 PID 1872 wrote to memory of 4892 1872 dwm.exe 133 PID 3600 wrote to memory of 4212 3600 WScript.exe 134 PID 3600 wrote to memory of 4212 3600 WScript.exe 134 PID 4212 wrote to memory of 3564 4212 dwm.exe 135 PID 4212 wrote to memory of 3564 4212 dwm.exe 135 PID 4212 wrote to memory of 4048 4212 dwm.exe 136 PID 4212 wrote to memory of 4048 4212 dwm.exe 136 PID 3564 wrote to memory of 888 3564 WScript.exe 137 PID 3564 wrote to memory of 888 3564 WScript.exe 137 PID 888 wrote to memory of 4292 888 dwm.exe 138 PID 888 wrote to memory of 4292 888 dwm.exe 138 PID 888 wrote to memory of 3932 888 dwm.exe 139 PID 888 wrote to memory of 3932 888 dwm.exe 139 PID 4292 wrote to memory of 2212 4292 WScript.exe 140 PID 4292 wrote to memory of 2212 4292 WScript.exe 140 PID 2212 wrote to memory of 5000 2212 dwm.exe 141 PID 2212 wrote to memory of 5000 2212 dwm.exe 141 PID 2212 wrote to memory of 1748 2212 dwm.exe 142 PID 2212 wrote to memory of 1748 2212 dwm.exe 142 PID 5000 wrote to memory of 548 5000 WScript.exe 144 PID 5000 wrote to memory of 548 5000 WScript.exe 144 PID 548 wrote to memory of 1720 548 dwm.exe 145 PID 548 wrote to memory of 1720 548 dwm.exe 145 -
System policy modification 1 TTPs 54 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe"C:\Users\Admin\AppData\Local\Temp\26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe"1⤵
- DcRat
- Modifies WinLogon for persistence
- UAC bypass
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2808 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\26ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Documents and Settings\Registry.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\msvcp110_win\SppExtComObj.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\NgcCtnrSvc\SppExtComObj.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\CloudExperienceHostCommon\RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Crashpad\reports\RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WqpaqZ34Ag.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:4684
-
-
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"3⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1936 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cc95f715-f81d-4d82-86f5-d5c11605c12b.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"5⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2836 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4faf994b-cc91-45ed-9912-93422d48df45.vbs"6⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"7⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4528 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e3cf0525-7cc6-4ddc-9cb7-4d2360e6cf66.vbs"8⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"9⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1872 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\660151f0-a465-4901-a023-838042d57db4.vbs"10⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"11⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4212 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3374b303-4371-479a-90e6-50f00adedcb6.vbs"12⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"13⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:888 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5506b28c-e30e-42ca-a8e4-89bc02534e2c.vbs"14⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"15⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2212 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c828d929-9858-4aa7-9759-9754c1437642.vbs"16⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"17⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:548 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bee50ccb-a9d3-40d9-a759-573b3c7eb27d.vbs"18⤵PID:1720
-
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"19⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2652 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3da9621c-7b4e-40d3-9e03-a6e512a7c167.vbs"20⤵PID:4948
-
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"21⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3580 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\640c511c-0255-4c53-9161-915e7725325d.vbs"22⤵PID:1824
-
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"23⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3564 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fd4da839-80a2-4767-b4cf-b1c4f58d86fe.vbs"24⤵PID:2208
-
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"25⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:312 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\366424c1-bba5-4f99-947a-7844cd0fb3bb.vbs"26⤵PID:3864
-
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"27⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1444 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9c483c6b-a47e-46f9-91c2-3b1f72ca3f03.vbs"28⤵PID:3636
-
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"29⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1440 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6d1e7a2f-ea1a-4e41-a7c6-116233d2d549.vbs"30⤵PID:2528
-
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"31⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4568 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\86cbd204-ed22-48a4-a8b6-5b0d4b2c0396.vbs"32⤵PID:4276
-
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"33⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1188 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d93ff77c-cde7-4daf-8162-0b506cef2c14.vbs"34⤵PID:4376
-
C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe"35⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3696 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0bf66b83-c1c3-42a5-b2f6-ef49d3cd4836.vbs"36⤵PID:4484
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\414ec261-f996-4b9a-abdd-c13d2d4da830.vbs"36⤵PID:4436
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\561a0cfa-2574-4f5b-b4dc-0d83af7882e6.vbs"34⤵PID:996
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c5f3eab5-c79f-4bea-86ba-736aea684380.vbs"32⤵PID:1584
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\88877501-1f75-45b9-8d94-e625da803e76.vbs"30⤵PID:964
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e632096c-1c60-4862-aae0-09a4498c3fcd.vbs"28⤵PID:2352
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\87c90144-e47a-458b-b39f-cef01054aa56.vbs"26⤵PID:2096
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6539b4b0-2e58-4839-9bde-27c674e53c5c.vbs"24⤵PID:4372
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b0255eee-ad46-487e-bba8-24dd226cb332.vbs"22⤵PID:1452
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8d760ee0-7344-4893-a4a0-3f62d0ec069a.vbs"20⤵PID:2036
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7d914fd5-689d-463e-acdf-fd7beb572be7.vbs"18⤵PID:1192
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bd7ef189-b7ab-48b5-a4c2-70f4dcf0c030.vbs"16⤵PID:1748
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ad2cd9e3-c93e-4e67-a621-4ac6ba929a8f.vbs"14⤵PID:3932
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\43704f4c-38f8-4f60-a13e-e9ba946f8eb8.vbs"12⤵PID:4048
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\08ff6079-eb86-4e2f-abc5-04af0a152d37.vbs"10⤵PID:4892
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b404972f-029d-427e-bd26-b22be1f4ef68.vbs"8⤵PID:1236
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2ff6631d-53f0-4c8e-ad78-21a1035a6c25.vbs"6⤵PID:3004
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f093b3aa-95f1-483b-af09-abd28d29d1a2.vbs"4⤵PID:3548
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Documents and Settings\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\msvcp110_win\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\NgcCtnrSvc\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\CloudExperienceHostCommon\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Crashpad\reports\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5aaeaa6b29411884b84d3d0b68b321ced
SHA102861d882c97c687fe758c9af113f21e8c5c5d46
SHA2569e7e6c6b2e44e6a86842de11f2ecf6057c85ca62f07337284eac45552221c45f
SHA512bfc3c87ca03c8e60b98aa8108c7e9bd42a369992de7ea6554f0e0a24b8c394bf29a1a638a5db2d313ec7c7d7d2a80a2a5d341213abc87ca8d3029e7b2f8a40f4
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
1.5MB
MD5fce9d4e93262ede30849aacc32d3c332
SHA1b40d5ed4e1c96a4f58415b3bd753e3bcc9029336
SHA2568b2e6dc70ec2dd557a9a7c4ed3b3b467e683504164bb52d041fe0c4127e0974d
SHA5128a6d2df5ea23114c9d5e5209df14e6a33a2f7ee47d9ed31d683fe9467dac3e1805ce0d056f024f7664a05e938f7a1c5a57532e1044fb2f159dadd8b2c560de54
-
Filesize
730B
MD5c6c08aaafd7dff1ab520abd6af39c0b0
SHA1c521d2ccfc481d6e0e2a78edf22fb709af4fda6c
SHA256cd1743ddf804ba19a1ca62f8604eb05584949f15b7f66b6f8184888e4fa3612e
SHA5125db81b4a944965f9336aa2aff918d08dc8721f578bd1e74f8b6480a9399f0138efe406008cdacc6675c96958551941be919be8a7fb6fe047ef91c786d752c06d
-
Filesize
729B
MD522e91d5418e403753319a59ed9efcced
SHA18f488eaafe126479015a92b134b049eefad626da
SHA256600edd952cc52ce4900da5626bee4c3d332b81bf07eb9786169643f6a50965f5
SHA5120819bd0e8e7711465df7b62c9faedfdae43ce2a4a8aa16c517f4ad21e2a95d30b09249dc7d590c35beaa84aef07793efe1f8d878e8601d4bb957773a14067766
-
Filesize
730B
MD59dbfe6930cc0e6aae40d22e536537eaf
SHA186f1fa8e924ae5b5158ee93c9047aaf9064d4d3d
SHA256779f8f87301b885b05fa99795505ef560072cc5d1117065f71b8e59a49e4f80c
SHA512c384971433f4d93656456815bca402554f71dd499ef12b4eeb4485b5cdf4548408b0a2b9021a4755f0f54aa210674d012e9b091a86db57511c63596752e91f4c
-
Filesize
730B
MD56ca680f7c8c6b382dd7338d577904e81
SHA1b91b58a96a0068d9b9d809545c8d0e357571d9d4
SHA256e4262b6b9258fbfc40ac5680d2f17dfaa1297b7c622ea00bdb89734ad1477b35
SHA51208d3041bb02a87125b154e1819ffd0e4eea4a2a70d2c0cb64cfd0472c30f0b1d9e11f2cb7d207a732be65500b31c9f85f1819f58a0eb345727887205a58c3ec5
-
Filesize
729B
MD547ffa331ee09a6a1ab7ea7d170a985a0
SHA160b2fa15672488030996384bb6879691785bb89b
SHA25699b783830f1b2b9578c9c5b136706912f25ba641efde4f8fa4eb1289c1553e87
SHA512d22002f4fa2ff754486afa4fa7775db4e5f55b0360f8b805446166390f5467223628943f4d2224a3d224b6e84ff2deba6861c8c433d7c9a02030d5f56c039fd0
-
Filesize
730B
MD5b290be22a80de40f6559c7e831aec3c7
SHA14c6995697f17939e242de93b5d43773cd3ccfd66
SHA256b237afd7433e7040e6814d80626875ce8ce8d76b2680b419473467ec62c44884
SHA512f1164de9301b491b4d56b8736014ef1a4e477ee267bf6b110b5f5d0160cabe946fae072918fac3760cdf23030b85f0af82484fe07480ef17be2a17d0f196482f
-
Filesize
730B
MD5547a1c7012afa24be93ccde6790136d4
SHA1ee9df7e2b618cacf9344be26379daca1a2d77a85
SHA256129c7baf64dc227fa10902e26e566c88d65e799dddad56d1c0c2f3123a541ab3
SHA5125d7573d5379d9a0cd6d6393c3f92c9973b47d8b2b6d315bbe9b65fa7298a7edffea1b828daeb34b0d38d6420e4ebcc1ec8b9561d8c6896bdff62ff869ddf2e76
-
Filesize
730B
MD56f0e295ea57456ce847c81c4bbb09d17
SHA1c50cc17fdf9d24fea27be58a8cdd17b5b4c9e9ac
SHA2560f4e8bbe0ff7679c4d5f285875a31fae367dcf546e423050f22799062a4c0f58
SHA5124f978bfab8752401d0a61a66f9a58b4827fb51900e162376a38dff1fb6354c52fe71e5ccaa1ae80c07007b1a6b27736c5e118f7f1ef699c07166bf9f3acb024c
-
Filesize
730B
MD5f1ebab220a99ee815562ff74c5e55228
SHA1a9daad1ad5b3e751c567d33ef494a925466ec3b5
SHA2568e669e299c6993c8bd4baa820be8224a30864c0911254d8631f220264b65e963
SHA5122fb0cdaa578f5ae62cf0ec0cddff5a981748e5c08803d76023d02c7b673cf9e7bfa788722dd6ba0da47bb8ed58d7cfd26cefb0ceb9ab37cd6004ebf72fef37d1
-
Filesize
218B
MD54413f3807c8c717a3882abe50f85f65e
SHA14b7d70e2d6ce6bfc41f91f645715cd6006912be7
SHA256026b0bb134d4a516d7471d169d5e6f84e1c311ea42e302cd8c068a3c363f486c
SHA512d3edce4f8c3a1f05d9deab2cd32df96e77b7279ef576c36eb663e8f8c05e16f93d8cb075d579db88fe5a1c720b12f0a5e64831cc24b3f0c8b71a19425a25093d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
729B
MD519e58fd7be1fb43b07e2e2908618948e
SHA17d50a7090f2d9dba1e19112360e83def05ea2973
SHA256ca7199ef770d3603b53817417a80f1a695d21819e2871c313c27ca0941aff74e
SHA5129bb935986240a96b8693a0af3d9ee078030839017bb7199f0f873fd4c02dd1dbba48f3a0820c934a5670c8769bab80fc784b6dd8f73f79ccb4f11b6d2d25d8ec
-
Filesize
730B
MD54270fbf6b4776f6e1224d893bc59ef74
SHA171b9b7f24b2f00e87fafbf2c9c54bba1079adfe7
SHA256393815300b987eb84676d5ce3df568fd106b938e2f4d247f8ab4c009d3e15c19
SHA512fd3fa7af827b35c14be7494d011ea1d7628bba882359e082112d5d397c594655661f4adf8ea89d5869f3b73e1496e50b36ce03232516c6f6beb0f89d6abaf590
-
Filesize
730B
MD5394ceb29a2a684bf18e7de47ba8a43e9
SHA188e6c2fd609a270ad393625755c809a46e5a235a
SHA2565a29e377c2ab0bc39f1a63f27565e51c549866be068162c6d78054f3ebca1a95
SHA51240fa1bc5bc72ad4fbf58fc23ea00c1e39e8765ba6e7adfb436858d7d7000174379ca324f64cf0c46a8ba54da25e447d7e3ee5ddb2853c1fd3097bb7846f72013
-
Filesize
730B
MD5e6411bcd84b379089f7c6fdc5763f405
SHA1a3878cd1abbd66d78537d9f5f9ea3b39b92e0287
SHA256741d6aaa8578c22da6230532d7c05c33e9cb0700c6e59e2392676cc48e802846
SHA512c7a15c20d482481876613a3f7edecd1a63603f44ab8c4c731ec26aae3089aa86b8f983f6aed2eb710062f63214a1823a2e3f6e33f25c19a0f315f28ef588e785
-
Filesize
506B
MD521b5d1af761c2ecc23b711e7abe5ef8b
SHA131c8fca44ce49dbe2188c782e4a933e98f8557a0
SHA256b5b4a52577479bffe56192b0d5319820a4dc284bf26f205b3884cc89ae734ba6
SHA5124aa9ecc5cc7753c3202876b874127d76eaf0a513b7f0b95baaa3432bbacd3b7fb6f29b3fa171a47f36d6e88b63ecafe8f88afedfae492886f243c75aeee0dc5a
-
Filesize
730B
MD55c5d1f83ff43f2422f745df680e5bdb7
SHA10e3f329e6801c05629c741faf82857a1fec872bb
SHA256f4b71f31059f28ece2a911e45998ba547ba43144b7854c1b2d20edc136dfa038
SHA5124ad02c4fbb555ddeaced2450109c5725f65f563b5e8b65612bce1c64c1054dc6227c3084ce0593a13eb946989b239253cb2cad567522409a71b713fad4fcf34e
-
Filesize
1.5MB
MD5a5fab16bfd5f2f5b2beef03fc634c78b
SHA1e2876e25315d4109734bd0ffa2e3d50db7550f5e
SHA25626ae980535130c95f6d19050c952ddcaf289ae27785e9d16e30ea2b19546c2f7
SHA512a8efef2e38b32410db153aa3a8db6558a03e9fe73ed930fc37aaf2af2559dbd4a99c90249156884ecdf573498f6d9e8cdcaac0c983f749cdaf831df611925894