Analysis
-
max time kernel
134s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 16:17
Behavioral task
behavioral1
Sample
d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe
Resource
win10v2004-20241007-en
General
-
Target
d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe
-
Size
2.3MB
-
MD5
465c263dd263abe9b54f1514ae40f005
-
SHA1
55b176f6b878e38f809c63b15408c5f76438398a
-
SHA256
d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8125d1274046b69b7dae
-
SHA512
c15e107b267aad8e17acb275ac6eda8b829ed5aa9b3c451cb8810b7e993b674acf2821337482424adec25d366e37c6708dd14bfa7876ffca1faa28a1fdbbd2f2
-
SSDEEP
49152:cXyFqpEX5DJ+8WLlEPeZUaPSzes33Ll4EPx79QCKZLwV6:ACqpmX+plEPys37bRQ
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 39 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4400 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 452 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1308 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2164 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4524 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1564 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3212 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 944 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4700 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5116 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5088 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4244 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4540 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2388 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 808 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4612 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4104 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4512 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1172 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3556 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3668 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3484 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4548 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4204 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1844 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4628 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4344 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1460 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4172 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1436 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5032 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3664 216 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3908 216 schtasks.exe 84 -
resource yara_rule behavioral2/memory/4856-1-0x0000000000420000-0x000000000067C000-memory.dmp dcrat behavioral2/files/0x0008000000023c09-20.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe -
Executes dropped EXE 1 IoCs
pid Process 1672 sihost.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\it-IT\c4a6f817dc0a4d d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File opened for modification C:\Program Files\7-Zip\Lang\sihost.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files (x86)\Windows Multimedia Platform\ee2ad38f3d4382 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files\Windows NT\TableTextService\en-US\unsecapp.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files\Microsoft Office\root\9e8d7a4ca61bd9 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files (x86)\Windows Defender\it-IT\d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files\Windows Mail\csrss.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files\Windows NT\TableTextService\en-US\29c1c3cc0f7685 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files\ModifiableWindowsApps\RuntimeBroker.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files\Common Files\microsoft shared\Source Engine\38384e6a620884 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files\7-Zip\Lang\sihost.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files\7-Zip\Lang\66fc9ff0ee96c2 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files\7-Zip\Idle.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files\7-Zip\6ccacd8608530f d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files\Windows Mail\886983d96e3d3e d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files\Common Files\microsoft shared\Source Engine\SearchApp.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Program Files\Microsoft Office\root\RuntimeBroker.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\fr-FR\6ccacd8608530f d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Windows\CSC\smss.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Windows\Containers\serviced\SearchApp.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Windows\Containers\serviced\38384e6a620884 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Windows\L2Schemas\d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Windows\L2Schemas\c4a6f817dc0a4d d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe File created C:\Windows\fr-FR\Idle.exe d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 39 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3212 schtasks.exe 4244 schtasks.exe 4540 schtasks.exe 3556 schtasks.exe 3908 schtasks.exe 1904 schtasks.exe 4548 schtasks.exe 4204 schtasks.exe 1436 schtasks.exe 944 schtasks.exe 1624 schtasks.exe 3668 schtasks.exe 4628 schtasks.exe 5116 schtasks.exe 808 schtasks.exe 1844 schtasks.exe 4344 schtasks.exe 4172 schtasks.exe 452 schtasks.exe 2388 schtasks.exe 4612 schtasks.exe 4104 schtasks.exe 4512 schtasks.exe 1172 schtasks.exe 1460 schtasks.exe 4400 schtasks.exe 2164 schtasks.exe 1564 schtasks.exe 2828 schtasks.exe 1664 schtasks.exe 4524 schtasks.exe 4700 schtasks.exe 1616 schtasks.exe 3484 schtasks.exe 5032 schtasks.exe 3664 schtasks.exe 1308 schtasks.exe 5088 schtasks.exe 2604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe 1672 sihost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe Token: SeDebugPrivilege 1672 sihost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4856 wrote to memory of 404 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe 124 PID 4856 wrote to memory of 404 4856 d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe 124 PID 404 wrote to memory of 4360 404 cmd.exe 126 PID 404 wrote to memory of 4360 404 cmd.exe 126 PID 404 wrote to memory of 1672 404 cmd.exe 127 PID 404 wrote to memory of 1672 404 cmd.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe"C:\Users\Admin\AppData\Local\Temp\d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9yBQ5K2f83.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:4360
-
-
C:\Program Files\7-Zip\Lang\sihost.exe"C:\Program Files\7-Zip\Lang\sihost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\Lang\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Program Files\7-Zip\Lang\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files\7-Zip\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files\7-Zip\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Mail\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Mail\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8d" /sc MINUTE /mo 7 /tr "'C:\Windows\L2Schemas\d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8" /sc ONLOGON /tr "'C:\Windows\L2Schemas\d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8d" /sc MINUTE /mo 14 /tr "'C:\Windows\L2Schemas\d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Windows\fr-FR\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\fr-FR\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Windows\fr-FR\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 11 /tr "'C:\Program Files\Common Files\microsoft shared\Source Engine\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\Source Engine\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Program Files\Common Files\microsoft shared\Source Engine\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\TableTextService\en-US\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\en-US\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows NT\TableTextService\en-US\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files\Microsoft Office\root\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\root\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office\root\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 8 /tr "'C:\Windows\Containers\serviced\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\Containers\serviced\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 8 /tr "'C:\Windows\Containers\serviced\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8d" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Defender\it-IT\d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\it-IT\d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8d" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Defender\it-IT\d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Admin\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203B
MD5f73c899c6a7c596ec54743fc1c3be8e9
SHA1032e4f5863c71193c3963654eb1a004b4c902ea6
SHA256c83d9aaa4b5b68fdf5f3cd176226120c10bc625368bedbd52ea47f137c60731b
SHA51257e840b3538ba4b1ec273e604a0cd0af1399380548a827623d5630494c5e59bfc155159cfe22d23e2d43446ee0ab885196d69c20e911a8442ea84324e7de8d93
-
Filesize
2.3MB
MD5465c263dd263abe9b54f1514ae40f005
SHA155b176f6b878e38f809c63b15408c5f76438398a
SHA256d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8125d1274046b69b7dae
SHA512c15e107b267aad8e17acb275ac6eda8b829ed5aa9b3c451cb8810b7e993b674acf2821337482424adec25d366e37c6708dd14bfa7876ffca1faa28a1fdbbd2f2