Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 17:09
Behavioral task
behavioral1
Sample
beadfeeaf9a0098d087b787fefe0d22e983a8d3cfa229b5b9a7e5d82dfec0c6d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
beadfeeaf9a0098d087b787fefe0d22e983a8d3cfa229b5b9a7e5d82dfec0c6d.exe
Resource
win10v2004-20241007-en
General
-
Target
beadfeeaf9a0098d087b787fefe0d22e983a8d3cfa229b5b9a7e5d82dfec0c6d.exe
-
Size
1.3MB
-
MD5
c86a437db52135725b8430ee3fc1b88f
-
SHA1
79a23ee39098f5b640ac07a9cdbb33497c98dc69
-
SHA256
beadfeeaf9a0098d087b787fefe0d22e983a8d3cfa229b5b9a7e5d82dfec0c6d
-
SHA512
32b1df626214f3291c8950088f84bf6b890189774303a71c7ec452bfcefe93a93f08480d42ca2bfb2102da1b8d9b0e44ef8600a4ab042010849b7ad2f70194a2
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2472 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2660 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1856 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1928 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1720 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 2744 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0007000000018687-12.dat dcrat behavioral1/memory/2328-13-0x0000000000BC0000-0x0000000000CD0000-memory.dmp dcrat behavioral1/memory/292-73-0x00000000010E0000-0x00000000011F0000-memory.dmp dcrat behavioral1/memory/1656-133-0x0000000000380000-0x0000000000490000-memory.dmp dcrat behavioral1/memory/1192-193-0x00000000002F0000-0x0000000000400000-memory.dmp dcrat behavioral1/memory/1368-253-0x0000000001190000-0x00000000012A0000-memory.dmp dcrat behavioral1/memory/1932-313-0x0000000000210000-0x0000000000320000-memory.dmp dcrat behavioral1/memory/2620-373-0x0000000001100000-0x0000000001210000-memory.dmp dcrat behavioral1/memory/2920-551-0x0000000001380000-0x0000000001490000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1160 powershell.exe 1764 powershell.exe 2980 powershell.exe 2956 powershell.exe 1620 powershell.exe 376 powershell.exe 1308 powershell.exe -
Executes dropped EXE 12 IoCs
pid Process 2328 DllCommonsvc.exe 292 DllCommonsvc.exe 1656 DllCommonsvc.exe 1192 DllCommonsvc.exe 1368 DllCommonsvc.exe 1932 DllCommonsvc.exe 2620 DllCommonsvc.exe 2956 DllCommonsvc.exe 2976 DllCommonsvc.exe 2920 DllCommonsvc.exe 1792 DllCommonsvc.exe 2772 DllCommonsvc.exe -
Loads dropped DLL 2 IoCs
pid Process 2804 cmd.exe 2804 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 23 raw.githubusercontent.com 29 raw.githubusercontent.com 36 raw.githubusercontent.com 5 raw.githubusercontent.com 9 raw.githubusercontent.com 12 raw.githubusercontent.com 26 raw.githubusercontent.com 33 raw.githubusercontent.com 4 raw.githubusercontent.com 16 raw.githubusercontent.com 19 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beadfeeaf9a0098d087b787fefe0d22e983a8d3cfa229b5b9a7e5d82dfec0c6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\MuiCache DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\MuiCache DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\MuiCache DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\MuiCache DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\MuiCache DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\MuiCache DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\MuiCache DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\MuiCache DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\MuiCache DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\MuiCache DllCommonsvc.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2008 schtasks.exe 2020 schtasks.exe 2344 schtasks.exe 2604 schtasks.exe 844 schtasks.exe 2792 schtasks.exe 1744 schtasks.exe 1856 schtasks.exe 2836 schtasks.exe 2808 schtasks.exe 1164 schtasks.exe 1284 schtasks.exe 1720 schtasks.exe 2044 schtasks.exe 2472 schtasks.exe 2620 schtasks.exe 2660 schtasks.exe 1928 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2328 DllCommonsvc.exe 2328 DllCommonsvc.exe 2328 DllCommonsvc.exe 2980 powershell.exe 1160 powershell.exe 2956 powershell.exe 1764 powershell.exe 1308 powershell.exe 376 powershell.exe 1620 powershell.exe 292 DllCommonsvc.exe 1656 DllCommonsvc.exe 1192 DllCommonsvc.exe 1368 DllCommonsvc.exe 1932 DllCommonsvc.exe 2620 DllCommonsvc.exe 2956 DllCommonsvc.exe 2976 DllCommonsvc.exe 2920 DllCommonsvc.exe 1792 DllCommonsvc.exe 2772 DllCommonsvc.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 2328 DllCommonsvc.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeDebugPrivilege 1160 powershell.exe Token: SeDebugPrivilege 2956 powershell.exe Token: SeDebugPrivilege 1764 powershell.exe Token: SeDebugPrivilege 1308 powershell.exe Token: SeDebugPrivilege 376 powershell.exe Token: SeDebugPrivilege 1620 powershell.exe Token: SeDebugPrivilege 292 DllCommonsvc.exe Token: SeDebugPrivilege 1656 DllCommonsvc.exe Token: SeDebugPrivilege 1192 DllCommonsvc.exe Token: SeDebugPrivilege 1368 DllCommonsvc.exe Token: SeDebugPrivilege 1932 DllCommonsvc.exe Token: SeDebugPrivilege 2620 DllCommonsvc.exe Token: SeDebugPrivilege 2956 DllCommonsvc.exe Token: SeDebugPrivilege 2976 DllCommonsvc.exe Token: SeDebugPrivilege 2920 DllCommonsvc.exe Token: SeDebugPrivilege 1792 DllCommonsvc.exe Token: SeDebugPrivilege 2772 DllCommonsvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2528 2096 beadfeeaf9a0098d087b787fefe0d22e983a8d3cfa229b5b9a7e5d82dfec0c6d.exe 31 PID 2096 wrote to memory of 2528 2096 beadfeeaf9a0098d087b787fefe0d22e983a8d3cfa229b5b9a7e5d82dfec0c6d.exe 31 PID 2096 wrote to memory of 2528 2096 beadfeeaf9a0098d087b787fefe0d22e983a8d3cfa229b5b9a7e5d82dfec0c6d.exe 31 PID 2096 wrote to memory of 2528 2096 beadfeeaf9a0098d087b787fefe0d22e983a8d3cfa229b5b9a7e5d82dfec0c6d.exe 31 PID 2528 wrote to memory of 2804 2528 WScript.exe 32 PID 2528 wrote to memory of 2804 2528 WScript.exe 32 PID 2528 wrote to memory of 2804 2528 WScript.exe 32 PID 2528 wrote to memory of 2804 2528 WScript.exe 32 PID 2804 wrote to memory of 2328 2804 cmd.exe 34 PID 2804 wrote to memory of 2328 2804 cmd.exe 34 PID 2804 wrote to memory of 2328 2804 cmd.exe 34 PID 2804 wrote to memory of 2328 2804 cmd.exe 34 PID 2328 wrote to memory of 1308 2328 DllCommonsvc.exe 54 PID 2328 wrote to memory of 1308 2328 DllCommonsvc.exe 54 PID 2328 wrote to memory of 1308 2328 DllCommonsvc.exe 54 PID 2328 wrote to memory of 376 2328 DllCommonsvc.exe 55 PID 2328 wrote to memory of 376 2328 DllCommonsvc.exe 55 PID 2328 wrote to memory of 376 2328 DllCommonsvc.exe 55 PID 2328 wrote to memory of 1160 2328 DllCommonsvc.exe 56 PID 2328 wrote to memory of 1160 2328 DllCommonsvc.exe 56 PID 2328 wrote to memory of 1160 2328 DllCommonsvc.exe 56 PID 2328 wrote to memory of 1764 2328 DllCommonsvc.exe 57 PID 2328 wrote to memory of 1764 2328 DllCommonsvc.exe 57 PID 2328 wrote to memory of 1764 2328 DllCommonsvc.exe 57 PID 2328 wrote to memory of 2980 2328 DllCommonsvc.exe 58 PID 2328 wrote to memory of 2980 2328 DllCommonsvc.exe 58 PID 2328 wrote to memory of 2980 2328 DllCommonsvc.exe 58 PID 2328 wrote to memory of 1620 2328 DllCommonsvc.exe 59 PID 2328 wrote to memory of 1620 2328 DllCommonsvc.exe 59 PID 2328 wrote to memory of 1620 2328 DllCommonsvc.exe 59 PID 2328 wrote to memory of 2956 2328 DllCommonsvc.exe 60 PID 2328 wrote to memory of 2956 2328 DllCommonsvc.exe 60 PID 2328 wrote to memory of 2956 2328 DllCommonsvc.exe 60 PID 2328 wrote to memory of 2268 2328 DllCommonsvc.exe 68 PID 2328 wrote to memory of 2268 2328 DllCommonsvc.exe 68 PID 2328 wrote to memory of 2268 2328 DllCommonsvc.exe 68 PID 2268 wrote to memory of 1776 2268 cmd.exe 70 PID 2268 wrote to memory of 1776 2268 cmd.exe 70 PID 2268 wrote to memory of 1776 2268 cmd.exe 70 PID 2268 wrote to memory of 292 2268 cmd.exe 71 PID 2268 wrote to memory of 292 2268 cmd.exe 71 PID 2268 wrote to memory of 292 2268 cmd.exe 71 PID 292 wrote to memory of 1232 292 DllCommonsvc.exe 72 PID 292 wrote to memory of 1232 292 DllCommonsvc.exe 72 PID 292 wrote to memory of 1232 292 DllCommonsvc.exe 72 PID 1232 wrote to memory of 2640 1232 cmd.exe 74 PID 1232 wrote to memory of 2640 1232 cmd.exe 74 PID 1232 wrote to memory of 2640 1232 cmd.exe 74 PID 1232 wrote to memory of 1656 1232 cmd.exe 75 PID 1232 wrote to memory of 1656 1232 cmd.exe 75 PID 1232 wrote to memory of 1656 1232 cmd.exe 75 PID 1656 wrote to memory of 2216 1656 DllCommonsvc.exe 76 PID 1656 wrote to memory of 2216 1656 DllCommonsvc.exe 76 PID 1656 wrote to memory of 2216 1656 DllCommonsvc.exe 76 PID 2216 wrote to memory of 1980 2216 cmd.exe 78 PID 2216 wrote to memory of 1980 2216 cmd.exe 78 PID 2216 wrote to memory of 1980 2216 cmd.exe 78 PID 2216 wrote to memory of 1192 2216 cmd.exe 79 PID 2216 wrote to memory of 1192 2216 cmd.exe 79 PID 2216 wrote to memory of 1192 2216 cmd.exe 79 PID 1192 wrote to memory of 2676 1192 DllCommonsvc.exe 80 PID 1192 wrote to memory of 2676 1192 DllCommonsvc.exe 80 PID 1192 wrote to memory of 2676 1192 DllCommonsvc.exe 80 PID 2676 wrote to memory of 1624 2676 cmd.exe 82 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\beadfeeaf9a0098d087b787fefe0d22e983a8d3cfa229b5b9a7e5d82dfec0c6d.exe"C:\Users\Admin\AppData\Local\Temp\beadfeeaf9a0098d087b787fefe0d22e983a8d3cfa229b5b9a7e5d82dfec0c6d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\My Videos\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Favorites\Links\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Documents\My Music\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\lsm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IuDiLqiv5E.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1776
-
-
C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Favorites\Links\HdAFbxPsUY.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:2640
-
-
C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Favorites\Links\OC0GCunrTP.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:1980
-
-
C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Favorites\Links\vtnIIYxwaN.bat"11⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:1624
-
-
C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Favorites\Links\Cx62k4VUCz.bat"13⤵PID:2732
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:2664
-
-
C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Favorites\Links\fMkIBJ6Z6X.bat"15⤵PID:2916
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:2804
-
-
C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Favorites\Links\4N1kIhG0Vd.bat"17⤵PID:2436
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:2144
-
-
C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Favorites\Links\abDhiC8Pgx.bat"19⤵PID:2468
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:1368
-
-
C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Favorites\Links\RYmbS7SklS.bat"21⤵PID:2480
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:2768
-
-
C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Favorites\Links\oqxkASPe1m.bat"23⤵PID:2296
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:1160
-
-
C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"24⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Favorites\Links\4po61ksQUN.bat"25⤵PID:2524
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:792
-
-
C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"C:\Users\Admin\Favorites\Links\DllCommonsvc.exe"26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Documents\My Videos\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Public\Documents\My Videos\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Documents\My Videos\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Favorites\Links\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Users\Admin\Favorites\Links\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Favorites\Links\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Documents\My Music\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Admin\Documents\My Music\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Documents\My Music\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d63a0e199a3e81ea4829a07433b4684
SHA18d26f20ae7d5e8022136942b7bc49d3bc63a6dde
SHA2562580523cb95dea2d9afb57d293d3f98ac788ccf34fe063743526d422814b40e6
SHA5123ede861f153707eb60f65120f564fc81b781f83a263af172cddfe5beb00cda76ea6877c9d483a7c46341e08232aca2f19dc107c42ca0abe959a80e1738feada0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794bf598cba9e38c297d5ebd1c0f6e52
SHA19d7e1f7208df7185132ae5285bb56ca7aa7dec09
SHA2566af434f2356a5967e945ccec2c442653c624601769bc48c7bc74c73aad1da665
SHA512c23c5de8c00fc5e88a477eb54845fc6217152b8ed58736e68e15367589f89d9c68091676d9d6bd2e1b6a5d766ac370c228e69b8d9324bc79591a2c3d5f6e2f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f6a26096eea3079601bc38783b007cf
SHA1394b87b47b5b288cd54c3f59f64b30f4484eec1e
SHA2560ea6d7f5d6503340effc0c7c1ed7fac54fbb7190a1bf6ca185a41b8d9acbac8c
SHA5126862d9fc64f96f8a0e73e4fd58165c84f28e39efb8adff429d391da51fee44d1f25f2b470927f124f33b5abc2926fa8781d7bb2b3d915dcd9219e7047f1f59e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe097cf7ebeb849a841bf44b862f22be
SHA13d7e9d6f7536281fd9af668d76a55852fe008865
SHA256ce54a223a090c9bfaef5779e869621c1ccfc9c36d0dbb079d6c4ff90388e0710
SHA51201d2fd7b0e9c1f657f8d3dc67ba7ee19259b06b55e82b2c6ab589b845b2c67372aa3724d0d4d9ef0e83d3d5cc3200b39f8b9958ceb6f7330c3d9401f083cf57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5066fb0acd9d9b334dbd4192253f6732f
SHA10ad68f4322b38239cc7d27f8d612674fd166a1bf
SHA25640d2472fd48f36e268a62c060418750c4c8751d436aac44f25949e6b8755f353
SHA51221f480b6d955b1f2ffdf1c29f46916984e5562ba78335a9ed20b933542892d2894cbfa15ce144a6a2e2f84702aa8838841dd4c4efba493a57e77492dc5524a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f92b2303a761fdfda8a6c41df5ce950
SHA1d1944ee6d35183d6c695b35a54079a0f0864570f
SHA2564e97773a200b06dd5784b1db69d5e10df28b69a4ed0a5988776fba93680dd550
SHA512a152e109667799ceb4031fccc7b71153d7e1a9632d3d6956666580b0142c193ea7bf78be00a39413548955e46ae1ad8148e84a25aebab234aa3cdc432fd0122a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5470ac1e72391075a86e9d5cabc1853ba
SHA14f41c3768bdd8c136402232752ecf4348ebc9111
SHA25632e717488056be58eff732eebe76f333f3a1f7cd2f76ba4905c19834baf00a84
SHA5123898b458bcd82d301d344d1efd1814cd6273da8079158dbac06af5cb11959a917e081cd642e52774622f1ce2fc3c14742e54aff7a03993e1ace7e7a0271256db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a90a3125aa14d3bd67a93c649f7a94
SHA10f63c905913a76cf08089c01c5dba3d03c70e69e
SHA25603d4d493504e2735a013314b0c12a8783cfe14fd0aaf80ea0ea3d2387e4d25fe
SHA512058c5251827fbb8a588b1f224589fc3521e9d7d608a25bfd94daa4e57cc01a548ddec8e0e078e1ea82f0e179d8e8e18184afd81d9a49a90b7fea4faf04fea207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdd5870da1e31967940f60f5d7df27f1
SHA16bdded29782daee78343c42ecc81c27fb1fada21
SHA2569c245031564eeb1ab68612c0c7b19e3bc0a8a711759b0dfa25d1099c41d0a8f5
SHA512e0af1101e28f94aee362331663f1b00b9968a554395989e14d34e081a0150b259baf2363d196f02d78bc656330ff67357b4ad7cba865d6c05077dbfce50e2447
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
212B
MD5d8367e7a2d84fff3e2039dd90092efb4
SHA1426b795b41dbb97492e4473eef786f1bf16ff3e7
SHA256a0e413b00d4a961db3ea19b33690b6d0dfbde24be13d7f4bd5ffe08924253fb6
SHA512027036134683ed814300c4dfaa46f197c197f9898bb3e70c5df72be1155ac27f74e12953dafdba6276325dcd01547beb9a2b949fb2b5cc6624488dc1af4e2de9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD559740583df17bf932cb5ce302761bf90
SHA108cfbe4b2f47087291715b538e26e70a2b9f4eb0
SHA256967dce4aaaefab0c0c04882df96f06314d8008f771a3cc2e57c58c5361d4998a
SHA51223425cfb0b17fd31f7a9d2c583aa3bb7e9f324e6275d2355e07e4f772be7d2b00fdd055385107dc10af3bf8fe8db4b4b57d504026978e8d95468b5582ca8eff8
-
Filesize
208B
MD5337c780224e1ed4425afe1249110429b
SHA10e3ada879f204710234816e0ac345994ee0d6236
SHA256bc1ca028f08f0197e5ce8d62ce95c8e6ec03e4059b8c1b7d2018def9d31b63a6
SHA5124bfc30b6964cbff2c3d99c6da975317ddffaf00c0b0b52882891305ea1f00e25ee34345f7e5f5b678dfc720711fc07fda9be0e22272aa367623911cbe4741185
-
Filesize
208B
MD52a8cc909205a4231b1d8e91685798e2f
SHA10cc829ea2cfe30e62bfd97c2d8fb219fbfdb31e1
SHA2569c2e6728b6b1405bd25a6a956de5188f97184c1c96fedccef9481c9fc2d02889
SHA5122fbbf17d3ab81f4f469e0d4abb794690c6c960e23ec1fb29fb9ec82b847eed707548d148ea50492729577706d5b3b002c372b07a3447a4b963e1dd1d75023a2c
-
Filesize
208B
MD5ddbfe6ffd8432a91253a291e5b66bf62
SHA16a9ffe6cf482744df2cfadadc740ba9cf833cbf1
SHA256e8b217c00db0a06c08af5bd96e953c09b16ba5ee7e4dc24deb821ab22183a5f5
SHA512165164e83bae1825bc5887e01bc39cb514a916a83b1c30f99e8eff19222317f16a72022acbb8287f063103a78d6485c457540c18e480af61e83a73d632562e78
-
Filesize
208B
MD5e0ff160f36a750bca434a09185d2356a
SHA1eeab2ecbd03ce35944f2510127ca3b8eed394658
SHA2566fce0c972b8e2f865ae7d7f803b6c959b1da8e005a4432d70507f689ea10306f
SHA5124f6912e846b5e5cdccdf31fc80d422f32672d03232bcda35e3d3a72f5f25d8a50a8a581d34e5d424e3027c2a6670a37f87ad1b6e5b83ea1c3dd85186affaa40c
-
Filesize
208B
MD5bb1c8837d44a9c65ef638904bc5aba85
SHA10bb7ed5bd019eecce928cd832087e41cd9a9cec5
SHA256e8860a200a8c12a95a17f57e21f3866007a3a12620a6219617bf729d539d78c7
SHA5127bca3d968aba619b5e4c49784d1164252103d51cfe4466213b0b46d12418f2525e998219ae271ddb19389cd1630e45a496141e92f3e190eb35994496469e491d
-
Filesize
208B
MD5a83a67553b186866c5848de6c62d0bba
SHA11c335829bd8cfdda2080bbac8951f662c5b05833
SHA2569e256a082b983b763b19c87edeb7679d1fb2106d6ca92fa8f324768450a79234
SHA512c7ee5531bf9f731ba062ce72f7f96052cffdc620dd4c72028a4a1d811379ef82633f4339cebf7431699f78da5f285efae106c91cafe9e853b2e40820cc1221d5
-
Filesize
208B
MD53983b4b5ef00e547a3c753d95051b17a
SHA16a55904cc00321abed60b970928a058e446afaf9
SHA256e339611fde249a543c95db34f02b70585979fae14d723422e30dea74e32d9964
SHA512007bc79509eca732b79676766b56ee6b9c7dc22a7ccb60bf7325a73a38e8bcd53d72d85137c4b5f0496a2e29e859c0f214029590e8614cab701f849a4da46f55
-
Filesize
208B
MD59744dbc45293634b9e725ffbddc55186
SHA1811be6851a57f8a0df6099366989d7cc50413d78
SHA25641c4b0d60074cf6dad9b7a28cfd5928648f8f7c18dc4ee6b5a086f40cd342153
SHA51290b511e6100b65204ff67e698c435bcaa12c820b618da6bf2db5d2037cd989c453b33bf866aa21f94913d132845eaea7e4098b23e9b12902b7e1773f5694f62c
-
Filesize
208B
MD530732a589f0ae56b41ff431da69b5e24
SHA15607f9a97bb3ca808bed57f73c433482da194faf
SHA256d251eacb696b0f578ca85f3b086cf10639983d07243b8c3001e81ae631c4deeb
SHA5123f1ea4ca5c7b56df92396401855305298cc962dada08410eb3478dd3badd607fcad5e4150bc13de9e060d81923bf96dfff2af502967df0dd8736f4097022a2f9
-
Filesize
208B
MD59f57ac341f98c9d72ae5efba3ab87675
SHA15ccb32df6bf926f4b94553c29ccb6d319de7f959
SHA256b593889af59cc0e9785c5b392669f29cdd361595c8a7f347fab1dbea58232211
SHA512cb11418fbffc56ee98bfcf8333df552f4f27e782b6bd189e67e098cb9b950bd8898ad0cf6848b5e3ec29d3e8f7a73631a9709234d76422128384482dd0778739
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478