Analysis

  • max time kernel
    50s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2025 19:04

General

  • Target

    81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7.exe

  • Size

    2.7MB

  • MD5

    7e97e05bf0649b2ff41dfafaae0af73a

  • SHA1

    0b7089e9d951281935559e908ae42b54ebdebd41

  • SHA256

    81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7

  • SHA512

    a5748b673c4b4c45228b4e31fab96b8f2db079a221b96143612b30710e8d068cfe1bf8221ffddf1002b074e1f80dfc2f7db824a98a09c97c26c7597b0531d00b

  • SSDEEP

    49152:sDkZWCF2T8juUND4YQxZzfllulb0fnyN27mEGnjYEhQ+QK:N4CF2sjELplCbmyN27PxEhQ+

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 57 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 45 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 57 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7.exe
    "C:\Users\Admin\AppData\Local\Temp\81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2432
    • C:\Users\Default\Videos\dllhost.exe
      "C:\Users\Default\Videos\dllhost.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:872
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\winlogon.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2692
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1372
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2588
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Windows\Tasks\wininit.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1452
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\Tasks\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2156
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Windows\Tasks\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2800
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea78" /sc MINUTE /mo 6 /tr "'C:\Users\Public\81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1892
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7" /sc ONLOGON /tr "'C:\Users\Public\81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1044
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea78" /sc MINUTE /mo 11 /tr "'C:\Users\Public\81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3040
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2108
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1740
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2924
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\Users\Default\SendTo\OSPPSVC.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2636
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\Default\SendTo\OSPPSVC.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2928
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Users\Default\SendTo\OSPPSVC.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:868
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Defender\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2664
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1256
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Defender\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:448
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\wininit.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:856
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:624
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2472
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\spoolsv.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1760
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Sync Framework\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:592
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1244
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\winlogon.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2300
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2184
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1368
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Mail\en-US\OSPPSVC.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2372
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\en-US\OSPPSVC.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3004
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Mail\en-US\OSPPSVC.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2016
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\wininit.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1156
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1268
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1900
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\smss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1480
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:832
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:560
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Windows\en-US\dllhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1688
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\en-US\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1896
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\en-US\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1464
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea78" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Reader\81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1880
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Reader\81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1204
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea78" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Reader\81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2032
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea78" /sc MINUTE /mo 6 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2320
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7" /sc ONLOGON /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1248
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea78" /sc MINUTE /mo 5 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2492
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Portable Devices\dllhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2312
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1528
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Portable Devices\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:844
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Users\Public\taskhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2520
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\Public\taskhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1772
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Users\Public\taskhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:884
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\smss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1692
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2116
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1524
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Videos\dllhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2844
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default\Videos\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2684
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Videos\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7.exe

    Filesize

    2.7MB

    MD5

    3bd3eb55cdb298f420c513ea66e0ed95

    SHA1

    b5b97add3e62b7c8e1b91272f09c1e25d9e3d386

    SHA256

    1c2584326266ac18208bdcb73bf1a40035ca6c086fd7ecfeb4904ac6017dfb33

    SHA512

    e4db17c8b77c84d44deaa2fefda402be3a5353bb29aca12ab7246eaab6ba83e461f4bcf21bb1281b63593dfd3228de1a913b85ddd23b9cf6697235f41e45293c

  • C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\csrss.exe

    Filesize

    2.7MB

    MD5

    13ee982ac413c7d471a6dcf57f291820

    SHA1

    cde2668106fdc6d0289ce1dd33e9abf59ef2e924

    SHA256

    cca9c4b13acd0bc4ad391fb51ee5b2b0f29415ad1f61fab54e3df38375265920

    SHA512

    a63d3c4a6dedca1bf5abd8cee5473334be1098ce5e592227f18a4085019e35fb53e00a7d3c0b11fc04b53fe1ba1a6960ee5e2b7803f1342e451f13e7f3479913

  • C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\OSPPSVC.exe

    Filesize

    2.7MB

    MD5

    7e97e05bf0649b2ff41dfafaae0af73a

    SHA1

    0b7089e9d951281935559e908ae42b54ebdebd41

    SHA256

    81f8f7131b6dbddec113e391b343f6bdbb321ec41a7400bf9c32f52afb8bcea7

    SHA512

    a5748b673c4b4c45228b4e31fab96b8f2db079a221b96143612b30710e8d068cfe1bf8221ffddf1002b074e1f80dfc2f7db824a98a09c97c26c7597b0531d00b

  • C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\OSPPSVC.exe

    Filesize

    2.7MB

    MD5

    41f75a9353eff95ccefe41afbb35054d

    SHA1

    63d318e07fd5731563444928b705a050fa313d5c

    SHA256

    a14c96635eba615f1c3d6329fedf4fce6372033bba1d416bb1815c5571fa245e

    SHA512

    82a13e36b061001dd6124939f3d85803344ff169f1c0083934aeec20aec748af893cc36881071b15654dd72c5328ba3fc6a89e25e884ea627532d10470553263

  • C:\Windows\Tasks\wininit.exe

    Filesize

    2.7MB

    MD5

    26837002cace404b83551116d26efa5b

    SHA1

    c590148f186ef50fe59455ea946df50e6d101ea6

    SHA256

    9dbee615605986d08bf76a97bcebb44edc8d32feb8f6974adebd687ff133ad13

    SHA512

    d1cd760c6d2f63b9af0bdabbbb63509f9401b76a4e0d7b1739f3e9d1cdc853a138c79fcb7188982e4db93e2c99b2ad8d491f70c24c94115d2541176006573ad6

  • memory/872-293-0x00000000021A0000-0x00000000021B2000-memory.dmp

    Filesize

    72KB

  • memory/872-292-0x000000001A900000-0x000000001A956000-memory.dmp

    Filesize

    344KB

  • memory/872-291-0x00000000002A0000-0x0000000000554000-memory.dmp

    Filesize

    2.7MB

  • memory/2432-7-0x00000000007B0000-0x00000000007C6000-memory.dmp

    Filesize

    88KB

  • memory/2432-19-0x0000000002490000-0x000000000249C000-memory.dmp

    Filesize

    48KB

  • memory/2432-10-0x00000000007F0000-0x0000000000846000-memory.dmp

    Filesize

    344KB

  • memory/2432-11-0x00000000022F0000-0x00000000022F8000-memory.dmp

    Filesize

    32KB

  • memory/2432-12-0x0000000002300000-0x0000000002312000-memory.dmp

    Filesize

    72KB

  • memory/2432-13-0x00000000023B0000-0x00000000023B8000-memory.dmp

    Filesize

    32KB

  • memory/2432-14-0x00000000023C0000-0x00000000023C8000-memory.dmp

    Filesize

    32KB

  • memory/2432-15-0x00000000023D0000-0x00000000023DC000-memory.dmp

    Filesize

    48KB

  • memory/2432-16-0x0000000002460000-0x000000000246E000-memory.dmp

    Filesize

    56KB

  • memory/2432-17-0x0000000002470000-0x000000000247C000-memory.dmp

    Filesize

    48KB

  • memory/2432-18-0x0000000002480000-0x000000000248A000-memory.dmp

    Filesize

    40KB

  • memory/2432-9-0x00000000007E0000-0x00000000007EA000-memory.dmp

    Filesize

    40KB

  • memory/2432-8-0x00000000007D0000-0x00000000007D8000-memory.dmp

    Filesize

    32KB

  • memory/2432-0-0x000007FEF6BF3000-0x000007FEF6BF4000-memory.dmp

    Filesize

    4KB

  • memory/2432-6-0x00000000007A0000-0x00000000007B0000-memory.dmp

    Filesize

    64KB

  • memory/2432-5-0x0000000000360000-0x0000000000368000-memory.dmp

    Filesize

    32KB

  • memory/2432-214-0x000007FEF6BF3000-0x000007FEF6BF4000-memory.dmp

    Filesize

    4KB

  • memory/2432-4-0x0000000000340000-0x000000000035C000-memory.dmp

    Filesize

    112KB

  • memory/2432-237-0x000007FEF6BF0000-0x000007FEF75DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2432-290-0x000007FEF6BF0000-0x000007FEF75DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2432-3-0x0000000000240000-0x000000000024E000-memory.dmp

    Filesize

    56KB

  • memory/2432-2-0x000007FEF6BF0000-0x000007FEF75DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2432-1-0x0000000000840000-0x0000000000AF4000-memory.dmp

    Filesize

    2.7MB