Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 20:50
Behavioral task
behavioral1
Sample
27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe
Resource
win10v2004-20241007-en
General
-
Target
27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe
-
Size
783KB
-
MD5
98847426d37f95205ac38af1a2dffcb4
-
SHA1
c859a5aa720b06186316cc5c42b4be0b34b4599b
-
SHA256
27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4
-
SHA512
b021f71904752c4cebcfc61530fe69dd720a38991a750f718d4b473890c560e7e5aca125df93d04336e8e1979eaa608162c87ce86e103f465f36e0571ce81875
-
SSDEEP
12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q
Malware Config
Signatures
-
DcRat 14 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 2900 schtasks.exe 1736 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Documents and Settings\\sppsvc.exe\"" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\System32\\FXSEVENT\\wininit.exe\"" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\KBDKAZ\\csrss.exe\"" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 2604 schtasks.exe 2584 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\msvfw32\\lsm.exe\"" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 2720 schtasks.exe 864 schtasks.exe 2588 schtasks.exe 2024 schtasks.exe 1972 schtasks.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe -
Dcrat family
-
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2588 284 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 284 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 284 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2900 284 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 864 284 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 284 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 284 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 284 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2584 284 schtasks.exe 28 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe -
resource yara_rule behavioral1/memory/628-1-0x0000000000C80000-0x0000000000D4A000-memory.dmp dcrat behavioral1/files/0x000600000001757f-32.dat dcrat behavioral1/files/0x000800000001659b-70.dat dcrat behavioral1/memory/1820-71-0x0000000001220000-0x00000000012EA000-memory.dmp dcrat behavioral1/memory/2848-98-0x0000000001100000-0x00000000011CA000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 2848 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Documents and Settings\\sppsvc.exe\"" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\System32\\FXSEVENT\\wininit.exe\"" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\NlsLexicons0018\\dwm.exe\"" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Recovery\\1f5748e2-69f6-11ef-b486-62cb582c238c\\csrss.exe\"" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files\\Microsoft Office\\Office14\\1033\\Idle.exe\"" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\KBDKAZ\\csrss.exe\"" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\msvfw32\\lsm.exe\"" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft .NET Framework 4.7.2 Setup_20240903_051533592\\27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe\"" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\Default User\\csrss.exe\"" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File opened for modification C:\Windows\System32\KBDKAZ\csrss.exe 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File opened for modification C:\Windows\System32\msvfw32\RCX89DA.tmp 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File created C:\Windows\System32\KBDKAZ\886983d96e3d3e31032c679b2d4ea91b6c05afef 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File created C:\Windows\System32\FXSEVENT\wininit.exe 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File opened for modification C:\Windows\System32\FXSEVENT\RCX8DE2.tmp 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File opened for modification C:\Windows\System32\FXSEVENT\wininit.exe 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File opened for modification C:\Windows\System32\NlsLexicons0018\dwm.exe 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File created C:\Windows\System32\KBDKAZ\csrss.exe 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File created C:\Windows\System32\msvfw32\lsm.exe 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File created C:\Windows\System32\msvfw32\101b941d020240259ca4912829b53995ad543df6 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File created C:\Windows\System32\NlsLexicons0018\dwm.exe 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File created C:\Windows\System32\FXSEVENT\560854153607923c4c5f107085a7db67be01f252 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File opened for modification C:\Windows\System32\KBDKAZ\RCX87D6.tmp 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File opened for modification C:\Windows\System32\msvfw32\lsm.exe 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File created C:\Windows\System32\NlsLexicons0018\6cb0b6c459d5d3455a3da700e713f2e2529862ff 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Office14\1033\Idle.exe 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File created C:\Program Files\Microsoft Office\Office14\1033\6ccacd8608530fba3a93e87ae2225c7032aa18c1 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\Idle.exe 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2604 schtasks.exe 1736 schtasks.exe 2584 schtasks.exe 864 schtasks.exe 2024 schtasks.exe 1972 schtasks.exe 2588 schtasks.exe 2720 schtasks.exe 2900 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Token: SeDebugPrivilege 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Token: SeDebugPrivilege 2848 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 628 wrote to memory of 2572 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 33 PID 628 wrote to memory of 2572 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 33 PID 628 wrote to memory of 2572 628 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 33 PID 2572 wrote to memory of 2692 2572 cmd.exe 35 PID 2572 wrote to memory of 2692 2572 cmd.exe 35 PID 2572 wrote to memory of 2692 2572 cmd.exe 35 PID 2572 wrote to memory of 1820 2572 cmd.exe 36 PID 2572 wrote to memory of 1820 2572 cmd.exe 36 PID 2572 wrote to memory of 1820 2572 cmd.exe 36 PID 1820 wrote to memory of 2848 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 42 PID 1820 wrote to memory of 2848 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 42 PID 1820 wrote to memory of 2848 1820 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe 42 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe"C:\Users\Admin\AppData\Local\Temp\27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe"1⤵
- DcRat
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:628 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cyUtI8Uu8P.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe"C:\Users\Admin\AppData\Local\Temp\27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Microsoft .NET Framework 4.7.2 Setup_20240903_051533592\27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft .NET Framework 4.7.2 Setup_20240903_051533592\27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\KBDKAZ\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\msvfw32\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Documents and Settings\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\FXSEVENT\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\NlsLexicons0018\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\Microsoft .NET Framework 4.7.2 Setup_20240903_051533592\27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\1033\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2584
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\27e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4.exe
Filesize783KB
MD598847426d37f95205ac38af1a2dffcb4
SHA1c859a5aa720b06186316cc5c42b4be0b34b4599b
SHA25627e7c3c983148345bd6694b972325c8af83587f9c414c891fad275697d714cb4
SHA512b021f71904752c4cebcfc61530fe69dd720a38991a750f718d4b473890c560e7e5aca125df93d04336e8e1979eaa608162c87ce86e103f465f36e0571ce81875
-
Filesize
783KB
MD5afa90b85663fa2a335df8aa181cc95ae
SHA126a62b2dca36cdbfef173a07be024b3ccca9282e
SHA256880fc50e5a8064133b2becb8381fb7d71747ba447b68d0bb1cde52dfbf3eabb5
SHA512f0fc7e97ed6266752ac168d2bf780803163dc0fca59cc9d2ba33e87cfe8bfbf9b58c49004bca8cd7ca21ac81a7cceeb2b3f1e605dd73ee476de7c5c93023960d
-
Filesize
266B
MD522473d1382e7c9889c5b109c227bd752
SHA1b340fec18a9366a05acd2dae95a18c3c4624b5a2
SHA256b24a5fb7a4f2a8bfc35904ecd35dffd9f1f0ccda5c0de28eafad031c0a9b89ea
SHA51286ec867fbfbca2945076318127d42dbb906246eaba8152e002bbb39c01e879bb0c8b0130a91a29e7edabab704672d6088561980a641b4b6fbffa8102c64eea24