Analysis
-
max time kernel
93s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 04:35
Behavioral task
behavioral1
Sample
94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe
Resource
win10v2004-20241007-en
General
-
Target
94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe
-
Size
2.6MB
-
MD5
6f3b935175a44298f056598daefd8f4a
-
SHA1
df49fbdec3d0c697da73ca8d2925522114325e1f
-
SHA256
94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd
-
SHA512
ed1346f979b017ec6b04dc6bdb7645c06975c78a8ddcc2fb97b9447aae65eb102403b20279957336112d4c93e7163803086a9ce6d38370d24f9328c704059a2e
-
SSDEEP
49152:PbA3phxcymVOgnOPsopuCiTsAqKl4iLPuqaLiUDVgZ1jAMLhN:PbYcfVOZEqiTKKl42aLpgZ1jjj
Malware Config
Signatures
-
DcRat 49 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 448 schtasks.exe 2608 schtasks.exe 4152 schtasks.exe 2648 schtasks.exe 3316 schtasks.exe 4548 schtasks.exe 2652 schtasks.exe 4496 schtasks.exe 3704 schtasks.exe 1812 schtasks.exe 1492 schtasks.exe 3168 schtasks.exe 4736 schtasks.exe 4652 schtasks.exe 3956 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe 4276 schtasks.exe 3820 schtasks.exe 3368 schtasks.exe 2544 schtasks.exe 2384 schtasks.exe 2364 schtasks.exe 2904 schtasks.exe 3680 schtasks.exe 1664 schtasks.exe 4908 schtasks.exe 3568 schtasks.exe 2104 schtasks.exe 1316 schtasks.exe 3156 schtasks.exe 1556 schtasks.exe 4172 schtasks.exe 4160 schtasks.exe 3708 schtasks.exe 184 schtasks.exe 4072 schtasks.exe 528 schtasks.exe 4412 schtasks.exe 1836 schtasks.exe 4048 schtasks.exe 4468 schtasks.exe 3236 schtasks.exe 2756 schtasks.exe 4340 schtasks.exe 4708 schtasks.exe 2296 schtasks.exe 1736 schtasks.exe 1996 schtasks.exe 1896 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3704 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1896 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4496 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 184 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2756 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3236 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4152 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2648 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3316 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1316 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4340 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4276 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4708 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4072 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3156 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1556 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 448 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 528 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3820 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3168 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3368 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2544 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3680 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2296 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4412 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4548 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2364 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4172 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4736 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4652 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1836 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4048 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4160 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4908 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3708 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4468 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3956 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3568 1132 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2652 1132 schtasks.exe 92 -
resource yara_rule behavioral2/files/0x0008000000023c32-20.dat dcrat behavioral2/memory/1016-22-0x00000000003F0000-0x0000000000642000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Mscontainerprovider.exe -
Executes dropped EXE 2 IoCs
pid Process 1016 Mscontainerprovider.exe 824 services.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ebf1f9fa8afd6d Mscontainerprovider.exe File created C:\Program Files\Windows NT\TableTextService\Idle.exe Mscontainerprovider.exe File created C:\Program Files\Windows NT\TableTextService\6ccacd8608530f Mscontainerprovider.exe File created C:\Program Files\Uninstall Information\sihost.exe Mscontainerprovider.exe File created C:\Program Files\Uninstall Information\66fc9ff0ee96c2 Mscontainerprovider.exe File created C:\Program Files (x86)\Windows Mail\spoolsv.exe Mscontainerprovider.exe File created C:\Program Files (x86)\Windows Mail\f3b6ecef712a24 Mscontainerprovider.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\cmd.exe Mscontainerprovider.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\fr-FR\unsecapp.exe Mscontainerprovider.exe File created C:\Windows\fr-FR\29c1c3cc0f7685 Mscontainerprovider.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings Mscontainerprovider.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3316 schtasks.exe 2904 schtasks.exe 4708 schtasks.exe 4072 schtasks.exe 3156 schtasks.exe 448 schtasks.exe 2104 schtasks.exe 2648 schtasks.exe 4172 schtasks.exe 3168 schtasks.exe 2384 schtasks.exe 2364 schtasks.exe 4468 schtasks.exe 1556 schtasks.exe 1736 schtasks.exe 528 schtasks.exe 2296 schtasks.exe 4412 schtasks.exe 4548 schtasks.exe 4736 schtasks.exe 4160 schtasks.exe 2756 schtasks.exe 1316 schtasks.exe 1996 schtasks.exe 1836 schtasks.exe 4048 schtasks.exe 3708 schtasks.exe 3568 schtasks.exe 4496 schtasks.exe 2608 schtasks.exe 2544 schtasks.exe 1664 schtasks.exe 4340 schtasks.exe 3368 schtasks.exe 184 schtasks.exe 1812 schtasks.exe 1492 schtasks.exe 3820 schtasks.exe 3680 schtasks.exe 4908 schtasks.exe 3704 schtasks.exe 1896 schtasks.exe 3956 schtasks.exe 2652 schtasks.exe 4652 schtasks.exe 4152 schtasks.exe 4276 schtasks.exe 3236 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1016 Mscontainerprovider.exe 1016 Mscontainerprovider.exe 1016 Mscontainerprovider.exe 1016 Mscontainerprovider.exe 1016 Mscontainerprovider.exe 1016 Mscontainerprovider.exe 1016 Mscontainerprovider.exe 1016 Mscontainerprovider.exe 1016 Mscontainerprovider.exe 824 services.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1016 Mscontainerprovider.exe Token: SeDebugPrivilege 824 services.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4240 wrote to memory of 2428 4240 94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe 82 PID 4240 wrote to memory of 2428 4240 94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe 82 PID 4240 wrote to memory of 2428 4240 94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe 82 PID 4240 wrote to memory of 1480 4240 94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe 83 PID 4240 wrote to memory of 1480 4240 94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe 83 PID 4240 wrote to memory of 1480 4240 94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe 83 PID 4240 wrote to memory of 1164 4240 94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe 84 PID 4240 wrote to memory of 1164 4240 94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe 84 PID 4240 wrote to memory of 1164 4240 94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe 84 PID 1164 wrote to memory of 1640 1164 cmd.exe 87 PID 1164 wrote to memory of 1640 1164 cmd.exe 87 PID 1164 wrote to memory of 1640 1164 cmd.exe 87 PID 2428 wrote to memory of 1584 2428 WScript.exe 88 PID 2428 wrote to memory of 1584 2428 WScript.exe 88 PID 2428 wrote to memory of 1584 2428 WScript.exe 88 PID 1584 wrote to memory of 1016 1584 cmd.exe 90 PID 1584 wrote to memory of 1016 1584 cmd.exe 90 PID 1016 wrote to memory of 3332 1016 Mscontainerprovider.exe 141 PID 1016 wrote to memory of 3332 1016 Mscontainerprovider.exe 141 PID 3332 wrote to memory of 1708 3332 cmd.exe 143 PID 3332 wrote to memory of 1708 3332 cmd.exe 143 PID 3332 wrote to memory of 824 3332 cmd.exe 144 PID 3332 wrote to memory of 824 3332 cmd.exe 144 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe"C:\Users\Admin\AppData\Local\Temp\94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd.exe"1⤵
- DcRat
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\HypercomwebsavesCommon\06TRX2vp5EEa5LRO2qIvamDAISMSY.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\HypercomwebsavesCommon\qBJRRaMx8bIHubO.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\HypercomwebsavesCommon\Mscontainerprovider.exe"C:\HypercomwebsavesCommon\Mscontainerprovider.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\i22DeO7dUj.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1708
-
-
C:\Users\Default User\services.exe"C:\Users\Default User\services.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\HypercomwebsavesCommon\file.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:1480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\HypercomwebsavesCommon\r2mekDnwHuGTXInEFmE.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1640
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\HypercomwebsavesCommon\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\HypercomwebsavesCommon\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\HypercomwebsavesCommon\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\HypercomwebsavesCommon\conhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\HypercomwebsavesCommon\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\HypercomwebsavesCommon\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Mail\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Mail\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\cmd.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\HypercomwebsavesCommon\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\HypercomwebsavesCommon\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\HypercomwebsavesCommon\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\HypercomwebsavesCommon\unsecapp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\HypercomwebsavesCommon\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 6 /tr "'C:\HypercomwebsavesCommon\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\services.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default User\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\HypercomwebsavesCommon\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\HypercomwebsavesCommon\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\HypercomwebsavesCommon\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 8 /tr "'C:\Windows\fr-FR\unsecapp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Windows\fr-FR\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 14 /tr "'C:\Windows\fr-FR\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows NT\TableTextService\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\TableTextService\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 6 /tr "'C:\Program Files\Uninstall Information\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 9 /tr "'C:\Program Files\Uninstall Information\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Libraries\wscript.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscript" /sc ONLOGON /tr "'C:\Users\Public\Libraries\wscript.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Libraries\wscript.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Users\Public\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Public\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Users\Public\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\HypercomwebsavesCommon\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\HypercomwebsavesCommon\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\HypercomwebsavesCommon\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD5f1d16665ffd0f6c105eb6959fe8191e8
SHA1306ffa126b9323b3cf6eec31d266510898ddd6b4
SHA2565fa7ef03d5257c7deb9ea12f21f4ff5886dbd667d44b28aaffcf9ff070e9da32
SHA5126ce173fe645e5a05a4c02da4b7b67c612867f234e6e0a14f20ef016d5bc2e0b7dc33766dffd98fc62f1fe357a8797486b9dbd198375cf801d4ec2231745cbadf
-
Filesize
2.3MB
MD5d53b913a47de930d631538231afc9f89
SHA1565818c582c9e8a1ae576111086379c569b5a557
SHA256dfd113a21fa8c15314f5873a2657d6fc698d6e7678f09ffe0755d81e01f422fd
SHA512b1b983139fbe41dcf17171cbb1978d8627347ee532d1b71e33330da4da57f1d096f8f807d3285256b158da73e2c5398d84f803c473196f4efde503d9a9bbbe87
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
51B
MD5e6f650718077366b66c45793bf847aba
SHA1053549a3540eb20fed7b618f899313ec8b36f7f9
SHA256e75e8150eef010f32b581e9bb62b3ff17eda9302452252954ccf0822bfa38a1b
SHA51299c82b2eec28d6c4c91e73c2bf8af1a6ee81234a5f57a5d53644b2bd2c6869f6b0a076bf45a4517f97a58f0974891c4fa5a69d5de09759efb256aa5fa2861814
-
Filesize
12B
MD5cde09bcdf5fde1e2eac52c0f93362b79
SHA17a0fd90576e08807bde2cc57bcf9854bbce05fe3
SHA2567592a3326e8f8297547f8c170b96b8aa8f5234027fd76593841a6574f098759c
SHA5120c3dc6a9d88ac98ee08a6aac028a1cf72e6d736227d36904a9daec84b30c2fccfd57a41daa4d73384bb91339482e98e226578eb0d87c958c2bfd2353181b680b
-
Filesize
199B
MD5b63ae8c14f8913fbe9b8007030b5d27f
SHA1f25f83477a06d192961e04d4c50bb884f2d07077
SHA256c030ca9c9c0b8ac6d97f7f12595c66e1e6a837155187711c595ca3efebe0d466
SHA5129ec25e83a0651d1193d6be9180fc69c274524905b27cd8f2cebee2538ed7a1d087d08d6031c4e28cee5614cf13ac7ea205e26022a898c931019d16138f291136