Resubmissions
19-12-2024 09:20
241219-la9kxsykfz 10Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 09:20
Behavioral task
behavioral1
Sample
a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe
Resource
win10v2004-20241007-en
General
-
Target
a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe
-
Size
783KB
-
MD5
12da5bf73f5194469ef18dfbbf732730
-
SHA1
b3780fe64b0e17195f44be49496d6910637c6f84
-
SHA256
a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1
-
SHA512
ba90992a64c9c68a8d90611b3d2ea499763b9a2d0e7ac24e9f370d1f5bc44e40080406cc6fe4dfe17073243e2f9ad134bf0be5d9e96a45be7b42c66263ae12f2
-
SSDEEP
12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 2740 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 2740 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1844 2740 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1076 2740 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3212 2740 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 228 2740 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 2740 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3204 2740 schtasks.exe 82 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe -
resource yara_rule behavioral2/memory/1692-1-0x0000000000840000-0x000000000090A000-memory.dmp dcrat behavioral2/files/0x0007000000023ca7-33.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe -
Executes dropped EXE 1 IoCs
pid Process 1580 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N = "\"C:\\Users\\Public\\AccountPictures\\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe\"" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Users\\Default\\Saved Games\\spoolsv.exe\"" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MusNotification = "\"C:\\Program Files\\Windows Portable Devices\\MusNotification.exe\"" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\System32\\wsmprovhost\\SppExtComObj.exe\"" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Windows\\L2Schemas\\System.exe\"" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Windows\\ShellExperiences\\System.exe\"" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\wpncore\\dllhost.exe\"" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N = "\"C:\\Recovery\\WindowsRE\\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe\"" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\System32\wpncore\dllhost.exe a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File created C:\Windows\System32\wsmprovhost\SppExtComObj.exe a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File created C:\Windows\System32\wsmprovhost\e1ef82546f0b02b7e974f28047f3788b1128cce1 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File created C:\Windows\System32\wpncore\dllhost.exe a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File created C:\Windows\System32\wpncore\5940a34987c99120d96dace90a3f93f329dcad63 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File opened for modification C:\Windows\System32\wsmprovhost\RCXA6F0.tmp a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File opened for modification C:\Windows\System32\wsmprovhost\SppExtComObj.exe a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File opened for modification C:\Windows\System32\wpncore\RCXAD7B.tmp a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Windows Portable Devices\aa97147c4c782d4a77c6b7822ef5383b917e6cfb a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File opened for modification C:\Program Files\Windows Portable Devices\RCXA45F.tmp a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File created C:\Program Files\Windows Portable Devices\MusNotification.exe a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File opened for modification C:\Program Files\Windows Portable Devices\MusNotification.exe a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\L2Schemas\System.exe a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File opened for modification C:\Windows\ShellExperiences\RCXAB76.tmp a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File opened for modification C:\Windows\ShellExperiences\System.exe a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File created C:\Windows\L2Schemas\System.exe a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File created C:\Windows\L2Schemas\27d1bcfc3c54e0e44ea423ffd4ee81fe73670a2a a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File created C:\Windows\ShellExperiences\System.exe a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File created C:\Windows\ShellExperiences\27d1bcfc3c54e0e44ea423ffd4ee81fe73670a2a a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe File opened for modification C:\Windows\L2Schemas\RCXA972.tmp a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1976 schtasks.exe 1992 schtasks.exe 1844 schtasks.exe 1076 schtasks.exe 3212 schtasks.exe 228 schtasks.exe 4236 schtasks.exe 3204 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1580 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1580 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1580 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 1580 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Token: SeDebugPrivilege 1580 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1692 wrote to memory of 3216 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 91 PID 1692 wrote to memory of 3216 1692 a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe 91 PID 3216 wrote to memory of 1356 3216 cmd.exe 93 PID 3216 wrote to memory of 1356 3216 cmd.exe 93 PID 3216 wrote to memory of 1580 3216 cmd.exe 98 PID 3216 wrote to memory of 1580 3216 cmd.exe 98 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe"C:\Users\Admin\AppData\Local\Temp\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe"1⤵
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1692 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jucZw7lhZY.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1356
-
-
C:\Users\Public\AccountPictures\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe"C:\Users\Public\AccountPictures\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1580
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\wsmprovhost\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\L2Schemas\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\ShellExperiences\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\wpncore\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default\Saved Games\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3204
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1N.exe.log
Filesize1KB
MD5b7c0c43fc7804baaa7dc87152cdc9554
SHA11bab62bd56af745678d4e967d91e1ccfdeed4038
SHA25646386a61f3aaf1b1c2e6efc9fc7e9e9ff16cd13ae58b8d856835771fedb6d457
SHA5129fda3dd00a3406137e0113f13f78e77b20a76512b35820d38df696842cbbf2e2ebabfb99a3846c9637ecb54af858ec1551521187e379872973006426a253f769
-
Filesize
265B
MD59dd447b789cb668951594b974432424e
SHA1d91abe69b15a179a813a6c341bd4e50e1d92bf61
SHA256b57f224bfa4ae2c97962fb808699af3d14954e8b3ff321e7d9b83769f20e6619
SHA512fba2aa8d21eb82e7859f4c36301bde71702d9d9ff7fbed37428cb892427f2b5371ff2e0ffb0c46585edf467108228a4cbbc48e742a2728f60dd555aed2e46150
-
Filesize
783KB
MD512da5bf73f5194469ef18dfbbf732730
SHA1b3780fe64b0e17195f44be49496d6910637c6f84
SHA256a5b3315ae86b5eb61d1216e3bbaada89678d1eb3e03955ebc7f20c1e16f1e2f1
SHA512ba90992a64c9c68a8d90611b3d2ea499763b9a2d0e7ac24e9f370d1f5bc44e40080406cc6fe4dfe17073243e2f9ad134bf0be5d9e96a45be7b42c66263ae12f2