Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 13:26
Behavioral task
behavioral1
Sample
JaffaCakes118_0530ecc8508010c5e2609173a9d90eb39035325ce748fa2540fe362563b50a71.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0530ecc8508010c5e2609173a9d90eb39035325ce748fa2540fe362563b50a71.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0530ecc8508010c5e2609173a9d90eb39035325ce748fa2540fe362563b50a71.exe
-
Size
1.3MB
-
MD5
6a3c9298a7e39ebd4939ac63c559d17a
-
SHA1
5b09ca1cbf00764f60d4052539d368141fdb9a3a
-
SHA256
0530ecc8508010c5e2609173a9d90eb39035325ce748fa2540fe362563b50a71
-
SHA512
de64ee340288a78324bca1edd87b36d4ddab7af74197e7d27c7122b32661ca1b31002c3406af933e4a93f5380698399cd98cab57017be24e7eb86c59a6ebf65b
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2364 1644 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 1644 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2768 1644 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3868 1644 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 1644 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4744 1644 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2716 1644 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5116 1644 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5044 1644 schtasks.exe 86 -
resource yara_rule behavioral2/files/0x0007000000023c98-10.dat dcrat behavioral2/memory/2504-13-0x0000000000740000-0x0000000000850000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2936 powershell.exe 112 powershell.exe 1948 powershell.exe 4240 powershell.exe -
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation JaffaCakes118_0530ecc8508010c5e2609173a9d90eb39035325ce748fa2540fe362563b50a71.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fontdrvhost.exe -
Executes dropped EXE 14 IoCs
pid Process 2504 DllCommonsvc.exe 3828 fontdrvhost.exe 1012 fontdrvhost.exe 396 fontdrvhost.exe 4144 fontdrvhost.exe 1708 fontdrvhost.exe 4240 fontdrvhost.exe 3880 fontdrvhost.exe 1588 fontdrvhost.exe 3704 fontdrvhost.exe 4740 fontdrvhost.exe 3552 fontdrvhost.exe 4492 fontdrvhost.exe 3124 fontdrvhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
flow ioc 53 raw.githubusercontent.com 16 raw.githubusercontent.com 17 raw.githubusercontent.com 24 raw.githubusercontent.com 28 raw.githubusercontent.com 46 raw.githubusercontent.com 39 raw.githubusercontent.com 45 raw.githubusercontent.com 52 raw.githubusercontent.com 54 raw.githubusercontent.com 41 raw.githubusercontent.com 51 raw.githubusercontent.com 40 raw.githubusercontent.com 55 raw.githubusercontent.com -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Crashpad\attachments\56085415360792 DllCommonsvc.exe File created C:\Program Files\Crashpad\attachments\wininit.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0530ecc8508010c5e2609173a9d90eb39035325ce748fa2540fe362563b50a71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings JaffaCakes118_0530ecc8508010c5e2609173a9d90eb39035325ce748fa2540fe362563b50a71.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings fontdrvhost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2768 schtasks.exe 3868 schtasks.exe 2136 schtasks.exe 2716 schtasks.exe 5116 schtasks.exe 1904 schtasks.exe 4744 schtasks.exe 5044 schtasks.exe 2364 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2504 DllCommonsvc.exe 2504 DllCommonsvc.exe 2504 DllCommonsvc.exe 4240 powershell.exe 112 powershell.exe 1948 powershell.exe 2936 powershell.exe 1948 powershell.exe 4240 powershell.exe 112 powershell.exe 3828 fontdrvhost.exe 2936 powershell.exe 1012 fontdrvhost.exe 396 fontdrvhost.exe 4144 fontdrvhost.exe 1708 fontdrvhost.exe 4240 fontdrvhost.exe 3880 fontdrvhost.exe 1588 fontdrvhost.exe 3704 fontdrvhost.exe 4740 fontdrvhost.exe 3552 fontdrvhost.exe 4492 fontdrvhost.exe 3124 fontdrvhost.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 2504 DllCommonsvc.exe Token: SeDebugPrivilege 4240 powershell.exe Token: SeDebugPrivilege 112 powershell.exe Token: SeDebugPrivilege 1948 powershell.exe Token: SeDebugPrivilege 2936 powershell.exe Token: SeDebugPrivilege 3828 fontdrvhost.exe Token: SeDebugPrivilege 1012 fontdrvhost.exe Token: SeDebugPrivilege 396 fontdrvhost.exe Token: SeDebugPrivilege 4144 fontdrvhost.exe Token: SeDebugPrivilege 1708 fontdrvhost.exe Token: SeDebugPrivilege 4240 fontdrvhost.exe Token: SeDebugPrivilege 3880 fontdrvhost.exe Token: SeDebugPrivilege 1588 fontdrvhost.exe Token: SeDebugPrivilege 3704 fontdrvhost.exe Token: SeDebugPrivilege 4740 fontdrvhost.exe Token: SeDebugPrivilege 3552 fontdrvhost.exe Token: SeDebugPrivilege 4492 fontdrvhost.exe Token: SeDebugPrivilege 3124 fontdrvhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2772 wrote to memory of 3124 2772 JaffaCakes118_0530ecc8508010c5e2609173a9d90eb39035325ce748fa2540fe362563b50a71.exe 82 PID 2772 wrote to memory of 3124 2772 JaffaCakes118_0530ecc8508010c5e2609173a9d90eb39035325ce748fa2540fe362563b50a71.exe 82 PID 2772 wrote to memory of 3124 2772 JaffaCakes118_0530ecc8508010c5e2609173a9d90eb39035325ce748fa2540fe362563b50a71.exe 82 PID 3124 wrote to memory of 4484 3124 WScript.exe 83 PID 3124 wrote to memory of 4484 3124 WScript.exe 83 PID 3124 wrote to memory of 4484 3124 WScript.exe 83 PID 4484 wrote to memory of 2504 4484 cmd.exe 85 PID 4484 wrote to memory of 2504 4484 cmd.exe 85 PID 2504 wrote to memory of 2936 2504 DllCommonsvc.exe 96 PID 2504 wrote to memory of 2936 2504 DllCommonsvc.exe 96 PID 2504 wrote to memory of 112 2504 DllCommonsvc.exe 97 PID 2504 wrote to memory of 112 2504 DllCommonsvc.exe 97 PID 2504 wrote to memory of 1948 2504 DllCommonsvc.exe 98 PID 2504 wrote to memory of 1948 2504 DllCommonsvc.exe 98 PID 2504 wrote to memory of 4240 2504 DllCommonsvc.exe 99 PID 2504 wrote to memory of 4240 2504 DllCommonsvc.exe 99 PID 2504 wrote to memory of 3828 2504 DllCommonsvc.exe 104 PID 2504 wrote to memory of 3828 2504 DllCommonsvc.exe 104 PID 3828 wrote to memory of 3344 3828 fontdrvhost.exe 108 PID 3828 wrote to memory of 3344 3828 fontdrvhost.exe 108 PID 3344 wrote to memory of 4408 3344 cmd.exe 110 PID 3344 wrote to memory of 4408 3344 cmd.exe 110 PID 3344 wrote to memory of 1012 3344 cmd.exe 112 PID 3344 wrote to memory of 1012 3344 cmd.exe 112 PID 1012 wrote to memory of 3572 1012 fontdrvhost.exe 115 PID 1012 wrote to memory of 3572 1012 fontdrvhost.exe 115 PID 3572 wrote to memory of 3492 3572 cmd.exe 117 PID 3572 wrote to memory of 3492 3572 cmd.exe 117 PID 3572 wrote to memory of 396 3572 cmd.exe 118 PID 3572 wrote to memory of 396 3572 cmd.exe 118 PID 396 wrote to memory of 2588 396 fontdrvhost.exe 120 PID 396 wrote to memory of 2588 396 fontdrvhost.exe 120 PID 2588 wrote to memory of 1144 2588 cmd.exe 122 PID 2588 wrote to memory of 1144 2588 cmd.exe 122 PID 2588 wrote to memory of 4144 2588 cmd.exe 124 PID 2588 wrote to memory of 4144 2588 cmd.exe 124 PID 4144 wrote to memory of 4712 4144 fontdrvhost.exe 125 PID 4144 wrote to memory of 4712 4144 fontdrvhost.exe 125 PID 4712 wrote to memory of 3284 4712 cmd.exe 127 PID 4712 wrote to memory of 3284 4712 cmd.exe 127 PID 4712 wrote to memory of 1708 4712 cmd.exe 128 PID 4712 wrote to memory of 1708 4712 cmd.exe 128 PID 1708 wrote to memory of 2832 1708 fontdrvhost.exe 129 PID 1708 wrote to memory of 2832 1708 fontdrvhost.exe 129 PID 2832 wrote to memory of 4720 2832 cmd.exe 131 PID 2832 wrote to memory of 4720 2832 cmd.exe 131 PID 2832 wrote to memory of 4240 2832 cmd.exe 132 PID 2832 wrote to memory of 4240 2832 cmd.exe 132 PID 4240 wrote to memory of 4116 4240 fontdrvhost.exe 133 PID 4240 wrote to memory of 4116 4240 fontdrvhost.exe 133 PID 4116 wrote to memory of 4628 4116 cmd.exe 135 PID 4116 wrote to memory of 4628 4116 cmd.exe 135 PID 4116 wrote to memory of 3880 4116 cmd.exe 136 PID 4116 wrote to memory of 3880 4116 cmd.exe 136 PID 3880 wrote to memory of 1460 3880 fontdrvhost.exe 137 PID 3880 wrote to memory of 1460 3880 fontdrvhost.exe 137 PID 1460 wrote to memory of 2432 1460 cmd.exe 139 PID 1460 wrote to memory of 2432 1460 cmd.exe 139 PID 1460 wrote to memory of 1588 1460 cmd.exe 140 PID 1460 wrote to memory of 1588 1460 cmd.exe 140 PID 1588 wrote to memory of 1216 1588 fontdrvhost.exe 141 PID 1588 wrote to memory of 1216 1588 fontdrvhost.exe 141 PID 1216 wrote to memory of 3224 1216 cmd.exe 143 PID 1216 wrote to memory of 3224 1216 cmd.exe 143 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0530ecc8508010c5e2609173a9d90eb39035325ce748fa2540fe362563b50a71.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0530ecc8508010c5e2609173a9d90eb39035325ce748fa2540fe362563b50a71.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\taskhostw.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Crashpad\attachments\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\12JaEZR6zX.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:4408
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7lFc7N4hi3.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:3492
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JhFjyqSsxH.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:1144
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2tBWjDxv5U.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:3284
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZES4mQr7Bk.bat"14⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:4720
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NiQtqM3qVs.bat"16⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:4628
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BjebbrynYr.bat"18⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:2432
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NiQtqM3qVs.bat"20⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:3224
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\60iZj2KDpL.bat"22⤵PID:632
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:4864
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4740 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GvLkm7sAXX.bat"24⤵PID:1052
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:3940
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3552 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Asmf6CRzTu.bat"26⤵PID:2832
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:2196
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WYuyh03jyF.bat"28⤵PID:3488
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:229⤵PID:1248
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3124 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0x9T38u1li.bat"30⤵PID:4024
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:231⤵PID:1332
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Default User\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Crashpad\attachments\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Crashpad\attachments\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files\Crashpad\attachments\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
202B
MD56f79e00d58e40a65af4aedee26643929
SHA15b72b6be5dab3f2a57c17e803572b65f6cd9f21a
SHA25675a467f81d6b76f4c598c48fd59acb42f12483818fadb62b3027c6ba291e5aa1
SHA512b41ea5f10703d70be5c6add682834e2a75755f0499db696314736d4bdb6e5889279f39a7dfdab8274d4c1331de08c681393e8d0e6040503774eda7a745369d59
-
Filesize
202B
MD50aa57001808075bc45a80f6639353bde
SHA17a472e0aa8540b1d1ee74402bfde6efac891b33e
SHA2568c3c8c1d8bf535ca167c97e9138f4aabc867da21d1be3a0ef802b10107dc53ab
SHA5123433bb7ae454da8d6c319d535cc2827e7d732f717144dfe0dae3fea1ed4a405615563b7d5c169f3af5b045c8f462659f952760deb71f4a9412a39e4fe7d1680a
-
Filesize
202B
MD54b3bf3620b29c5f3527aa41a4c22a465
SHA1756aa15c518193df65430e209fb6d0c2013d49a8
SHA25645b7e16e6a8a2479f643bd60534e1ea6bbaff057bec266e7c9ff091debd3c80f
SHA512f80551bf173ea62296a215f5c46600a6b15b70f1b9fcee485685f960462cff72bdd19bfddb1fdc76e8d3b2be4872d88d472bf1faa2469dbe16149ede42f13a61
-
Filesize
202B
MD51d39646c0b81b229f0d051789c08a8d0
SHA1cf0c3895786542c9e900300035b377b1413c0062
SHA2565259e07b22af663a2f8f8afeb63036846b0a41630904d12309d13d827dc258f2
SHA512bdbd1f7e355354a81a408c945b0f7d97bac59399cf1f39b44c9d7865cabf3bcc9106523c46d48e3cc374875e30a43eeca4e59d71c85f7baec6b42e9e6b60d214
-
Filesize
202B
MD5e62ce89c6a4316e3e966316a4f54f9a1
SHA1915604d953bfb15e850e358486436e1c67f5f323
SHA2566fbc349fe2348c2e844901a1d61988a680b2d2c01661b0470801d0cbd805dc58
SHA512053446691a16d435454e6b2ff2e0e6632cf8045f52ff5862ad825a86dd116b741d3889b8d44b54d050bd7af7ed08b84cf31a2389b5a92112bf6e349390afdd3e
-
Filesize
202B
MD5356aa4d9ea146dc87188770729ad6c44
SHA1d0b541c9bb26f8799acc1977a0e7a0c1bd957539
SHA2562c8152300294a1da98dda0d1268fca66e690a5e2859e37dadcaad87a0e54de47
SHA51287c16b4ff0fc97cccefaaba82fd8764a91bf747484c413b351b3e1d92df3681e518f5f7075740b2ffd6f1ff5dcedfbee034dde4ca1d3ee616af047dd99823e89
-
Filesize
202B
MD570a6b37ac67c6bb3731475d9b69825c0
SHA1bfe393383f9dbe086374d3de5b1c889a50b85ce2
SHA256e7313c9a742c3cb8dfa0f4f01eaa184213cece62e68e015dead98ae93d621a48
SHA5127f1315f335680148001cbd368c09c3556a3a85146ba4c725eb358b302e5b37291b496ed2813b78e0869b0cc7ae21525f42120f61a0583fc35e0c323f8991c428
-
Filesize
202B
MD590e936d802f41594c073a2999b071cbc
SHA132022d2f77f9ee58f5e4f69dace5846dcb9415d9
SHA256b1b70fc7545949fc692f72cb5406dcf0931c2d8c311dde74010fcd0b4d695df2
SHA51208bfab799f8caf8515619a606661a0e4b9ad9ab80c08577e841f68ce51277961ce68b741adea4edf5cccde906414a58d4610d116d482906ea9faea529a52c112
-
Filesize
202B
MD5f552b5eeb83160b1bb1a656cc2923ac5
SHA1cc22d8f12a034f9ee96767fee0bfa8c14e1feb18
SHA2561e57145c0174fdb9cc7aaae873fe98005268cff402e353f402add56cd26baec5
SHA5120faa1cc1741ece9ffca3268a44b8db83cbac90f318c3785a39ccb0096bed60df73325a0f14c9fbc7790a662680dd8ba12c4e451d0ec2a176cdb400160e166de1
-
Filesize
202B
MD53dfe477659b1e4d523c258a17f8a3482
SHA1002152de55399806880615c7217dc3631eeddd75
SHA256e0671c2c10890d4b726d645d1505841241442dac0edf7bc3581523f045f7b466
SHA51221627bc3589594456228ee9e1e87f624d451fd17b9927f87e3b3bfb5284ac0df97c4c68dbc935ed1faa6572fa77a786c33b9bc4a6fa8377d3ce343fcebe4301d
-
Filesize
202B
MD559b6fe26380871ff2267203cd65c93b6
SHA1b4aba31e982fc01b2354e8f5311cd6331ef9b896
SHA2560a99b2ed0e29cc0f257123db004cb042c2cc86b93c9450dce8c6104243392ca0
SHA51291990ad6880b5e38f52496566467eddc8414ac26ad4f48bab62caab0926f5458576040351a2d22e733f0fb72ef412acb1950b6a4e52f87e9a32e460adf9f1c6c
-
Filesize
202B
MD58e5e95eb3e8c496aefc3b68c3c81968e
SHA1d24166b13c904e577c04744cbea8c5947a1db17a
SHA256891cb8c62fc7c73820e44fb29a9c80f0044dcb011a42c6ce6742460c77b98ae6
SHA512e3a118f73e467e2582e286a06d218ad2921a2ce4d7e7909118a77e8ee7ef50b0e2726ddd1e875c98063072c5e064f5ddff98d0d642d41305d5c93bf5d1de5a51
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478