Analysis
-
max time kernel
144s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 16:43
Behavioral task
behavioral1
Sample
b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7.exe
Resource
win10v2004-20241007-en
General
-
Target
b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7.exe
-
Size
1.3MB
-
MD5
8bb337eba353818e44fd5f985e1a8d3c
-
SHA1
875a05913d56539e42df069163dfe4ea003c07e5
-
SHA256
b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7
-
SHA512
19f4598127a3c6c11a13565ccc557f0a58f593abb14b3647e0ab04fa6cf08ee26ca792d3f8c8e68b2e723236862e86c306d03b170458e5526436900771bec530
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2496 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1524 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2280 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2848 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2952 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1788 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2896 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1772 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2648 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1420 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 980 2668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 320 2668 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x000800000001662e-9.dat dcrat behavioral1/memory/2664-13-0x00000000001C0000-0x00000000002D0000-memory.dmp dcrat behavioral1/memory/3048-36-0x0000000000D90000-0x0000000000EA0000-memory.dmp dcrat behavioral1/memory/1216-250-0x00000000000D0000-0x00000000001E0000-memory.dmp dcrat behavioral1/memory/1204-310-0x0000000000D60000-0x0000000000E70000-memory.dmp dcrat behavioral1/memory/2052-430-0x0000000000EE0000-0x0000000000FF0000-memory.dmp dcrat behavioral1/memory/2388-549-0x0000000001350000-0x0000000001460000-memory.dmp dcrat behavioral1/memory/856-609-0x0000000000330000-0x0000000000440000-memory.dmp dcrat behavioral1/memory/2924-669-0x0000000000870000-0x0000000000980000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2356 powershell.exe 1696 powershell.exe 568 powershell.exe 792 powershell.exe 1976 powershell.exe 3052 powershell.exe 1672 powershell.exe -
Executes dropped EXE 12 IoCs
pid Process 2664 DllCommonsvc.exe 3048 spoolsv.exe 1228 spoolsv.exe 2860 spoolsv.exe 1216 spoolsv.exe 1204 spoolsv.exe 2544 spoolsv.exe 2052 spoolsv.exe 1208 spoolsv.exe 2388 spoolsv.exe 856 spoolsv.exe 2924 spoolsv.exe -
Loads dropped DLL 2 IoCs
pid Process 2552 cmd.exe 2552 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 26 raw.githubusercontent.com 30 raw.githubusercontent.com 34 raw.githubusercontent.com 4 raw.githubusercontent.com 12 raw.githubusercontent.com 16 raw.githubusercontent.com 23 raw.githubusercontent.com 5 raw.githubusercontent.com 9 raw.githubusercontent.com 19 raw.githubusercontent.com 37 raw.githubusercontent.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\f3b6ecef712a24 DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\spoolsv.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\Internet Explorer\spoolsv.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2952 schtasks.exe 2648 schtasks.exe 2844 schtasks.exe 2616 schtasks.exe 320 schtasks.exe 1600 schtasks.exe 2280 schtasks.exe 1164 schtasks.exe 1788 schtasks.exe 2872 schtasks.exe 1420 schtasks.exe 1524 schtasks.exe 1060 schtasks.exe 2848 schtasks.exe 980 schtasks.exe 2496 schtasks.exe 2896 schtasks.exe 1772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2664 DllCommonsvc.exe 2664 DllCommonsvc.exe 2664 DllCommonsvc.exe 1696 powershell.exe 1976 powershell.exe 568 powershell.exe 1672 powershell.exe 3052 powershell.exe 792 powershell.exe 2356 powershell.exe 3048 spoolsv.exe 1228 spoolsv.exe 2860 spoolsv.exe 1216 spoolsv.exe 1204 spoolsv.exe 2544 spoolsv.exe 2052 spoolsv.exe 1208 spoolsv.exe 2388 spoolsv.exe 856 spoolsv.exe 2924 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 2664 DllCommonsvc.exe Token: SeDebugPrivilege 3048 spoolsv.exe Token: SeDebugPrivilege 1696 powershell.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 568 powershell.exe Token: SeDebugPrivilege 1672 powershell.exe Token: SeDebugPrivilege 3052 powershell.exe Token: SeDebugPrivilege 792 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 1228 spoolsv.exe Token: SeDebugPrivilege 2860 spoolsv.exe Token: SeDebugPrivilege 1216 spoolsv.exe Token: SeDebugPrivilege 1204 spoolsv.exe Token: SeDebugPrivilege 2544 spoolsv.exe Token: SeDebugPrivilege 2052 spoolsv.exe Token: SeDebugPrivilege 1208 spoolsv.exe Token: SeDebugPrivilege 2388 spoolsv.exe Token: SeDebugPrivilege 856 spoolsv.exe Token: SeDebugPrivilege 2924 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 880 wrote to memory of 2796 880 b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7.exe 30 PID 880 wrote to memory of 2796 880 b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7.exe 30 PID 880 wrote to memory of 2796 880 b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7.exe 30 PID 880 wrote to memory of 2796 880 b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7.exe 30 PID 2796 wrote to memory of 2552 2796 WScript.exe 31 PID 2796 wrote to memory of 2552 2796 WScript.exe 31 PID 2796 wrote to memory of 2552 2796 WScript.exe 31 PID 2796 wrote to memory of 2552 2796 WScript.exe 31 PID 2552 wrote to memory of 2664 2552 cmd.exe 33 PID 2552 wrote to memory of 2664 2552 cmd.exe 33 PID 2552 wrote to memory of 2664 2552 cmd.exe 33 PID 2552 wrote to memory of 2664 2552 cmd.exe 33 PID 2664 wrote to memory of 792 2664 DllCommonsvc.exe 53 PID 2664 wrote to memory of 792 2664 DllCommonsvc.exe 53 PID 2664 wrote to memory of 792 2664 DllCommonsvc.exe 53 PID 2664 wrote to memory of 568 2664 DllCommonsvc.exe 54 PID 2664 wrote to memory of 568 2664 DllCommonsvc.exe 54 PID 2664 wrote to memory of 568 2664 DllCommonsvc.exe 54 PID 2664 wrote to memory of 1696 2664 DllCommonsvc.exe 55 PID 2664 wrote to memory of 1696 2664 DllCommonsvc.exe 55 PID 2664 wrote to memory of 1696 2664 DllCommonsvc.exe 55 PID 2664 wrote to memory of 1976 2664 DllCommonsvc.exe 56 PID 2664 wrote to memory of 1976 2664 DllCommonsvc.exe 56 PID 2664 wrote to memory of 1976 2664 DllCommonsvc.exe 56 PID 2664 wrote to memory of 2356 2664 DllCommonsvc.exe 57 PID 2664 wrote to memory of 2356 2664 DllCommonsvc.exe 57 PID 2664 wrote to memory of 2356 2664 DllCommonsvc.exe 57 PID 2664 wrote to memory of 1672 2664 DllCommonsvc.exe 58 PID 2664 wrote to memory of 1672 2664 DllCommonsvc.exe 58 PID 2664 wrote to memory of 1672 2664 DllCommonsvc.exe 58 PID 2664 wrote to memory of 3052 2664 DllCommonsvc.exe 59 PID 2664 wrote to memory of 3052 2664 DllCommonsvc.exe 59 PID 2664 wrote to memory of 3052 2664 DllCommonsvc.exe 59 PID 2664 wrote to memory of 3048 2664 DllCommonsvc.exe 67 PID 2664 wrote to memory of 3048 2664 DllCommonsvc.exe 67 PID 2664 wrote to memory of 3048 2664 DllCommonsvc.exe 67 PID 3048 wrote to memory of 2564 3048 spoolsv.exe 68 PID 3048 wrote to memory of 2564 3048 spoolsv.exe 68 PID 3048 wrote to memory of 2564 3048 spoolsv.exe 68 PID 2564 wrote to memory of 2868 2564 cmd.exe 70 PID 2564 wrote to memory of 2868 2564 cmd.exe 70 PID 2564 wrote to memory of 2868 2564 cmd.exe 70 PID 2564 wrote to memory of 1228 2564 cmd.exe 71 PID 2564 wrote to memory of 1228 2564 cmd.exe 71 PID 2564 wrote to memory of 1228 2564 cmd.exe 71 PID 1228 wrote to memory of 1928 1228 spoolsv.exe 72 PID 1228 wrote to memory of 1928 1228 spoolsv.exe 72 PID 1228 wrote to memory of 1928 1228 spoolsv.exe 72 PID 1928 wrote to memory of 1752 1928 cmd.exe 74 PID 1928 wrote to memory of 1752 1928 cmd.exe 74 PID 1928 wrote to memory of 1752 1928 cmd.exe 74 PID 1928 wrote to memory of 2860 1928 cmd.exe 75 PID 1928 wrote to memory of 2860 1928 cmd.exe 75 PID 1928 wrote to memory of 2860 1928 cmd.exe 75 PID 2860 wrote to memory of 1920 2860 spoolsv.exe 76 PID 2860 wrote to memory of 1920 2860 spoolsv.exe 76 PID 2860 wrote to memory of 1920 2860 spoolsv.exe 76 PID 1920 wrote to memory of 2444 1920 cmd.exe 78 PID 1920 wrote to memory of 2444 1920 cmd.exe 78 PID 1920 wrote to memory of 2444 1920 cmd.exe 78 PID 1920 wrote to memory of 1216 1920 cmd.exe 79 PID 1920 wrote to memory of 1216 1920 cmd.exe 79 PID 1920 wrote to memory of 1216 1920 cmd.exe 79 PID 1216 wrote to memory of 2572 1216 spoolsv.exe 80 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7.exe"C:\Users\Admin\AppData\Local\Temp\b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Program Files (x86)\Internet Explorer\spoolsv.exe"C:\Program Files (x86)\Internet Explorer\spoolsv.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZgKlNS7JdR.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2868
-
-
C:\Program Files (x86)\Internet Explorer\spoolsv.exe"C:\Program Files (x86)\Internet Explorer\spoolsv.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SQTB2Yz9K3.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:1752
-
-
C:\Program Files (x86)\Internet Explorer\spoolsv.exe"C:\Program Files (x86)\Internet Explorer\spoolsv.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VF9LbKHiRa.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2444
-
-
C:\Program Files (x86)\Internet Explorer\spoolsv.exe"C:\Program Files (x86)\Internet Explorer\spoolsv.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rZY5mW9Lj2.bat"12⤵PID:2572
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:2016
-
-
C:\Program Files (x86)\Internet Explorer\spoolsv.exe"C:\Program Files (x86)\Internet Explorer\spoolsv.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\djCrJd6RmA.bat"14⤵PID:1692
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:2196
-
-
C:\Program Files (x86)\Internet Explorer\spoolsv.exe"C:\Program Files (x86)\Internet Explorer\spoolsv.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qUPyb5cGVE.bat"16⤵PID:2408
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:2552
-
-
C:\Program Files (x86)\Internet Explorer\spoolsv.exe"C:\Program Files (x86)\Internet Explorer\spoolsv.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LdHmevWlG3.bat"18⤵PID:2720
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:3052
-
-
C:\Program Files (x86)\Internet Explorer\spoolsv.exe"C:\Program Files (x86)\Internet Explorer\spoolsv.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7ouYA2TrKB.bat"20⤵PID:1852
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:2224
-
-
C:\Program Files (x86)\Internet Explorer\spoolsv.exe"C:\Program Files (x86)\Internet Explorer\spoolsv.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\onYrHPGvDe.bat"22⤵PID:2072
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:296
-
-
C:\Program Files (x86)\Internet Explorer\spoolsv.exe"C:\Program Files (x86)\Internet Explorer\spoolsv.exe"23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\R8iYvsD9nO.bat"24⤵PID:2304
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:1800
-
-
C:\Program Files (x86)\Internet Explorer\spoolsv.exe"C:\Program Files (x86)\Internet Explorer\spoolsv.exe"25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Internet Explorer\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Internet Explorer\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\providercommon\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\providercommon\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\providercommon\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ffe88899e17bf51d02d5ec0712f984c
SHA14441ff47bb2b2a1b70096b9ce58de380444653f6
SHA25619ab1327ab41adfe006ade2811d5f91e4384fe563db7c456dd11435ad02800bc
SHA512036c4554007485850ea1e997fbd04c33da5b95231b1bd3a9be5abaa90c451dc412874949230be8d6f649104ec53356a0aaeb26c42b9690d8e8ca64a4f39d6673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa7cc05d7e4a40dc6d6fd0149ea021f
SHA1d51c42ac8affba1895dd395ed1bded1355fcbd16
SHA2566002ee34c9df3ecb38bc73a4df52804d85d858572e751dd6788e6c7a4e2efe15
SHA5121d8c3e8b2bdb8a7bd643b64bab3ab85832cb1ea352056d6d7861278255a9c2e6dd25cfe2cc1ecea7b30ee12cdcd3346d7cc58849c67dc98a6a80fd2545feee76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a96045837ac063c869335c05bf6d90
SHA158b967c49a52681f46a9a8ea9884a0ca9614f740
SHA25684896e6e4c10458c65ae865312ffbd3a32bb8a62140f67bb124b4a5abd7aeafb
SHA51200681cd3182c889ada350b2c37707c75acc18799d6b4d263ff54ad37edeb1b934ed661e0abd4e7c4706d414b83c2f8da6e307d8daaa1ce1b354c69f28eea98f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cdb8fb4b868ee0a38ad75af50a86c8e
SHA18e7528fedfbf0f00f48fdf8a19498d56b4519867
SHA256a33f97a4dd416b0c0997734ba7075c249dc5d86f351275b0009c1be6f8099bd0
SHA512eea2a3691394f3fad860a98f0ac3d46f9c7395fa50ecfc51422f507c428a5acbdc8de7e8d65940a58b15b355baa3985a1c9cd71d5f1db6a7d85018c641ffca2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ac388cae874e79d1d35da7e62c1cc1a
SHA1ea775377ce3755ae3a58a73709c7fa950ddc3fec
SHA2569543d210c243de57eb3a5ba934d3efa213cc3eaca1e3beb533e91e409b663cf9
SHA512b03f7c8faafda153b11a4fec834a34134cf6be3c7f189bacedc678e79f3f56bbd459a876476c538cd18437a34c38063bc570fc9ca93827d4b6971e784944fb23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5758b89f42e3ac5b00f5038acec3b4224
SHA17a4ccadfe36f910cfaa5cd15c661b2fcdc84264e
SHA256109d929afefffc661c8bcd2252f03024aea16942f320eb2e500ade7bde419a12
SHA512db1c1fc65ab283d240bac8981b480d9f79ddedf09516c236e7ca54d670d7ebd55de1df080385e68a9f9f201bb30b9fe270459fca8ba0a50389d17c76a1258376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b88b0d29545e99c1ff6ffe0cd178d8
SHA1df99bef4d28d3631084199b4a9f27fa14f9e04d1
SHA25662de60f91fc00fc6d9bcedffaa0f14e306b56564a65d9f3cccd4b631cf3ba217
SHA5125cd27d026cb78a70add2e0d1f80bac56aa4071eb7537f41bd758ec5114c5185cb40ac138637fe2815711fed198d1693b21f087f336e293d8a5d2982a72a5dbef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d2a7cfca9094872b5679d26f5fb797e
SHA1282b2835abb6b688016fbe5927cfaa41dbe2cd72
SHA25686ecaaa9af8573c88b3de3914d5fb8ae8fe47e4cb5ec6dc21aaa553bea8fda21
SHA512360d2c03fad0abdd13d93090ef88d4199cd0b5c3bad9d9ec20daebab3b85bb00c46af890ba0678f438522960d66a3f66ea8d7b86a4b933badf96f30ba2b7e2a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1bcbf4d7d9c78d1f343c06beae662e1
SHA183c07a7b067e10030c1ee07f511c3a80ac2f2225
SHA2567f148af816ca8bc201e5419d236db58ea1b092cba7dd0483360ae6815c5afdf7
SHA5128a2bbb5bc928a9c66d1c60a1a1f9fa4681fb4198da2de1ba3b6f9c0113a651205920a82ede4478ec5b04b650b4220ab7c3d18d49d8cf8aa4cb3f1b5d1b8cfebb
-
Filesize
217B
MD580d63cbfe49420987e227256c0c6e869
SHA12dc250488913114583d66f8a2c6e7f4bcc8cf9f0
SHA2563215be7c29827f782d606f03e08d4ec7a9fb97a886cbaa817cff3f4a1a4b247a
SHA512cb073b9e2a16c228dd37adbf8d4300d618e897329494c9861c9fb30d0b2d465bf65c589f0858360110127ecb3e68bd5d694b9e85f62801246556239cba33d093
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
217B
MD586be5fbeb1b85f05413993ef0fc49183
SHA199b9cabec18293e4e5a9853239cd92256c65ad90
SHA256994ab3b5e8f08f7d2f6a21af0c9b12bc94d21b651280343f283e91e05bcd9068
SHA51204b62e8715f560cff314612606f10ce484da8922b2ea5cfc098c705fd2a4096365e678eb4a5de88005d21d54922137cc161d2a1484b8728b79b24f3b1f1e4f07
-
Filesize
217B
MD59bd2db25cc4354050a16d0b513f1d2df
SHA1f66d2765c20c82b5dcf8351fb9f00c9b58ca4558
SHA256d36a9f33785b937955fff467f162da3b476b0204295598819a7e8bf8a7dd2ef8
SHA512866c62e82ba6a9bf8cd6cc18bfe8bc82f86af27ceb876d39e01111a95ca14a59793bcf7672f0e5f4f0db06349ee25a8979bb9c60576c99adb57a26e43b421235
-
Filesize
217B
MD5933c851bdfd340308005b2ea39c90f7c
SHA167453d27a3e90b599c0046fc74033a87b66a8361
SHA256fb2727ab5864b60157f584f0f04595f86b9f33e8760dd3ab6b586568eb8b1758
SHA51213e8c9c3f2b085963d48617e3aa4d885ccfe3d6c32e3994bc299819d12e206c13584f4fa3ba629bd3e28af3202cef621815c80cbcf040f14f43903d45131d0d8
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
217B
MD5584809d28c62b4be72184c518945563f
SHA1b5e8914a548f72ce961e481269558519e86eba35
SHA2563a5628d928e076bb834abb94e5611ba338d566e6a9de5e5b348c80b6f83ebe96
SHA512272b8b069e6c73ce2924e04b4a0f7c6a9d324998bc5034aaeb0aae1f2dd3e0278b95886a155b0049a65322a6905f7295c26f5847f4939aefb87a3e2c8a4d5e0f
-
Filesize
217B
MD55929ea9c42c18eb66b82c1682392c7af
SHA1a745d1e74726d620aaf6ebc1738247c7d271b35d
SHA256a4a013871796a73f6bf88705e4b4aa37a77e19469b022604427b3fb072234445
SHA5123fafdd99ea4cc1878deebfcc7c9c3e1497808b2b25e780b3848f7d4b80f18579822b682a7f00ea2ffe56f1d1f30c4ba32ebe70c47c8df887a43bfeadabdbb621
-
Filesize
217B
MD5ef8a26620ea117db66f5d1e691be821b
SHA158e76159913d5d047fdd47a1d84ef29e07eeb978
SHA2565fcb3f45a4946d910e11f24b51cb2b9b74970e93358c12d45b75ae8d490e7bfb
SHA51238e4c7317aeb110bc8a7d26add7aa5bfa95417177280fe95b102ba094259048e47c650c5786dc47e41431be5abc118418813a6052e23e0e37c35fb337f28413d
-
Filesize
217B
MD59786923ffa6fe977eb6184c18bda8907
SHA15832c387f9df79ff58f26790453d1702f29c0b06
SHA2564e7baec802572e5bb6aacc62667796e045654659aad3371c93dd1f8d76237f3e
SHA512af42a49dfb58cc8885e6e83b8d4e6bbb925447e687ed9ab0c3f87ad79a53920b4edb6cb00b1c582bab7aed6605091607ee596c3c7ee0fecb3da299ac461868c3
-
Filesize
217B
MD5f665f3b6d4ea86dc8d7eaf821154315a
SHA136c77378025c4ef9a612dec96554518da6e839fd
SHA25631c48f54ae3036b956a8869ced21e32fc380d1227e1afefe1c3abd79692b7918
SHA51288a9c47a63870f0c3c5451fbaf82da5434579c0762b5b0f5357574e7f716cca0af72e5412e1f01961aa667af5c5c684eec20d1a94f756093a5e20393bd18a339
-
Filesize
217B
MD5856e84119acc6912a889c9061d88792b
SHA1f35aebcdddf766b1ac1d9c6dcbd86912ed909697
SHA2566b2acd304516ad49cfc30fe178efc1180d64bc02ef1c57ef6f9a2c8b9c8fea6a
SHA512049eff9a97ffaee30fe7d4b3d72e7f90916fa5f867a4cb8e4e863ff87e3094d49100384f2d2b7e828321349ed1c4b4f6ada8f0ba2cb3e22a7a396fda938e77a6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58b894f5565ac0ceaecb3d83096a53259
SHA19d5e3b24d2493aa569341a2ade21db763cb31cf3
SHA2560c57ade14b19a48147c42ef3679a0674c4c8e2ff9c1f7fca2a84267fec2dc284
SHA512260bc40d4aa8400ac23b9f8ab2e2c36097320211c8700ce9b8aa26cc2608163e1f6ff066707c989a103e77224178d80b5315d8b761faad6d60996de20c510d5b
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394