Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 13:58
Behavioral task
behavioral1
Sample
45d03f6ba4d06819eb27a337042d9fa565f6aa1f1a2c547353253e5acf3441bdN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45d03f6ba4d06819eb27a337042d9fa565f6aa1f1a2c547353253e5acf3441bdN.exe
Resource
win10v2004-20241007-en
General
-
Target
45d03f6ba4d06819eb27a337042d9fa565f6aa1f1a2c547353253e5acf3441bdN.exe
-
Size
1.3MB
-
MD5
a9d19f70bf472f2a78f5add56b8f7c60
-
SHA1
9f4a35a2411be167378d72ef4f1ce9acd1932c08
-
SHA256
45d03f6ba4d06819eb27a337042d9fa565f6aa1f1a2c547353253e5acf3441bd
-
SHA512
397f6eb4feca1637b1db1db97b504955b3355254d21b83cd0dbdae3ebc2cae76cf3aa3ff2f8de50274e3764f6a004f64c50651977b9e9fbe664a8d03bc8cbd5d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1840 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 820 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3040 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1096 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 544 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 1648 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1312 1648 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0007000000015fa6-9.dat dcrat behavioral1/memory/2592-13-0x0000000000EE0000-0x0000000000FF0000-memory.dmp dcrat behavioral1/memory/1972-62-0x0000000000220000-0x0000000000330000-memory.dmp dcrat behavioral1/memory/1684-121-0x0000000000EA0000-0x0000000000FB0000-memory.dmp dcrat behavioral1/memory/2604-241-0x00000000012A0000-0x00000000013B0000-memory.dmp dcrat behavioral1/memory/1724-302-0x0000000001390000-0x00000000014A0000-memory.dmp dcrat behavioral1/memory/2928-421-0x0000000000130000-0x0000000000240000-memory.dmp dcrat behavioral1/memory/2776-481-0x00000000008A0000-0x00000000009B0000-memory.dmp dcrat behavioral1/memory/820-542-0x0000000000E80000-0x0000000000F90000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3060 powershell.exe 2288 powershell.exe 2516 powershell.exe 1348 powershell.exe 2656 powershell.exe 2332 powershell.exe -
Executes dropped EXE 10 IoCs
pid Process 2592 DllCommonsvc.exe 1972 explorer.exe 1684 explorer.exe 2144 explorer.exe 2604 explorer.exe 1724 explorer.exe 2936 explorer.exe 2928 explorer.exe 2776 explorer.exe 820 explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 2872 cmd.exe 2872 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 13 raw.githubusercontent.com 16 raw.githubusercontent.com 20 raw.githubusercontent.com 27 raw.githubusercontent.com 30 raw.githubusercontent.com 9 raw.githubusercontent.com 23 raw.githubusercontent.com -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Java\6ccacd8608530f DllCommonsvc.exe File created C:\Program Files\Java\Idle.exe DllCommonsvc.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\IME\es-ES\0a1fd5f707cd16 DllCommonsvc.exe File created C:\Windows\IME\es-ES\sppsvc.exe DllCommonsvc.exe File opened for modification C:\Windows\IME\es-ES\sppsvc.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45d03f6ba4d06819eb27a337042d9fa565f6aa1f1a2c547353253e5acf3441bdN.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2168 schtasks.exe 3048 schtasks.exe 3040 schtasks.exe 3016 schtasks.exe 2816 schtasks.exe 820 schtasks.exe 2284 schtasks.exe 1676 schtasks.exe 544 schtasks.exe 2928 schtasks.exe 1312 schtasks.exe 1840 schtasks.exe 2976 schtasks.exe 2180 schtasks.exe 1096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2592 DllCommonsvc.exe 2332 powershell.exe 2656 powershell.exe 3060 powershell.exe 2288 powershell.exe 2516 powershell.exe 1348 powershell.exe 1972 explorer.exe 1684 explorer.exe 2144 explorer.exe 2604 explorer.exe 1724 explorer.exe 2936 explorer.exe 2928 explorer.exe 2776 explorer.exe 820 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2592 DllCommonsvc.exe Token: SeDebugPrivilege 2332 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeDebugPrivilege 3060 powershell.exe Token: SeDebugPrivilege 2288 powershell.exe Token: SeDebugPrivilege 2516 powershell.exe Token: SeDebugPrivilege 1348 powershell.exe Token: SeDebugPrivilege 1972 explorer.exe Token: SeDebugPrivilege 1684 explorer.exe Token: SeDebugPrivilege 2144 explorer.exe Token: SeDebugPrivilege 2604 explorer.exe Token: SeDebugPrivilege 1724 explorer.exe Token: SeDebugPrivilege 2936 explorer.exe Token: SeDebugPrivilege 2928 explorer.exe Token: SeDebugPrivilege 2776 explorer.exe Token: SeDebugPrivilege 820 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2120 2672 45d03f6ba4d06819eb27a337042d9fa565f6aa1f1a2c547353253e5acf3441bdN.exe 31 PID 2672 wrote to memory of 2120 2672 45d03f6ba4d06819eb27a337042d9fa565f6aa1f1a2c547353253e5acf3441bdN.exe 31 PID 2672 wrote to memory of 2120 2672 45d03f6ba4d06819eb27a337042d9fa565f6aa1f1a2c547353253e5acf3441bdN.exe 31 PID 2672 wrote to memory of 2120 2672 45d03f6ba4d06819eb27a337042d9fa565f6aa1f1a2c547353253e5acf3441bdN.exe 31 PID 2120 wrote to memory of 2872 2120 WScript.exe 32 PID 2120 wrote to memory of 2872 2120 WScript.exe 32 PID 2120 wrote to memory of 2872 2120 WScript.exe 32 PID 2120 wrote to memory of 2872 2120 WScript.exe 32 PID 2872 wrote to memory of 2592 2872 cmd.exe 34 PID 2872 wrote to memory of 2592 2872 cmd.exe 34 PID 2872 wrote to memory of 2592 2872 cmd.exe 34 PID 2872 wrote to memory of 2592 2872 cmd.exe 34 PID 2592 wrote to memory of 3060 2592 DllCommonsvc.exe 51 PID 2592 wrote to memory of 3060 2592 DllCommonsvc.exe 51 PID 2592 wrote to memory of 3060 2592 DllCommonsvc.exe 51 PID 2592 wrote to memory of 2288 2592 DllCommonsvc.exe 52 PID 2592 wrote to memory of 2288 2592 DllCommonsvc.exe 52 PID 2592 wrote to memory of 2288 2592 DllCommonsvc.exe 52 PID 2592 wrote to memory of 2516 2592 DllCommonsvc.exe 53 PID 2592 wrote to memory of 2516 2592 DllCommonsvc.exe 53 PID 2592 wrote to memory of 2516 2592 DllCommonsvc.exe 53 PID 2592 wrote to memory of 1348 2592 DllCommonsvc.exe 54 PID 2592 wrote to memory of 1348 2592 DllCommonsvc.exe 54 PID 2592 wrote to memory of 1348 2592 DllCommonsvc.exe 54 PID 2592 wrote to memory of 2656 2592 DllCommonsvc.exe 55 PID 2592 wrote to memory of 2656 2592 DllCommonsvc.exe 55 PID 2592 wrote to memory of 2656 2592 DllCommonsvc.exe 55 PID 2592 wrote to memory of 2332 2592 DllCommonsvc.exe 56 PID 2592 wrote to memory of 2332 2592 DllCommonsvc.exe 56 PID 2592 wrote to memory of 2332 2592 DllCommonsvc.exe 56 PID 2592 wrote to memory of 1972 2592 DllCommonsvc.exe 63 PID 2592 wrote to memory of 1972 2592 DllCommonsvc.exe 63 PID 2592 wrote to memory of 1972 2592 DllCommonsvc.exe 63 PID 1972 wrote to memory of 2868 1972 explorer.exe 64 PID 1972 wrote to memory of 2868 1972 explorer.exe 64 PID 1972 wrote to memory of 2868 1972 explorer.exe 64 PID 2868 wrote to memory of 2900 2868 cmd.exe 66 PID 2868 wrote to memory of 2900 2868 cmd.exe 66 PID 2868 wrote to memory of 2900 2868 cmd.exe 66 PID 2868 wrote to memory of 1684 2868 cmd.exe 67 PID 2868 wrote to memory of 1684 2868 cmd.exe 67 PID 2868 wrote to memory of 1684 2868 cmd.exe 67 PID 1684 wrote to memory of 2832 1684 explorer.exe 68 PID 1684 wrote to memory of 2832 1684 explorer.exe 68 PID 1684 wrote to memory of 2832 1684 explorer.exe 68 PID 2832 wrote to memory of 2184 2832 cmd.exe 70 PID 2832 wrote to memory of 2184 2832 cmd.exe 70 PID 2832 wrote to memory of 2184 2832 cmd.exe 70 PID 2832 wrote to memory of 2144 2832 cmd.exe 71 PID 2832 wrote to memory of 2144 2832 cmd.exe 71 PID 2832 wrote to memory of 2144 2832 cmd.exe 71 PID 2144 wrote to memory of 1740 2144 explorer.exe 72 PID 2144 wrote to memory of 1740 2144 explorer.exe 72 PID 2144 wrote to memory of 1740 2144 explorer.exe 72 PID 1740 wrote to memory of 2860 1740 cmd.exe 74 PID 1740 wrote to memory of 2860 1740 cmd.exe 74 PID 1740 wrote to memory of 2860 1740 cmd.exe 74 PID 1740 wrote to memory of 2604 1740 cmd.exe 75 PID 1740 wrote to memory of 2604 1740 cmd.exe 75 PID 1740 wrote to memory of 2604 1740 cmd.exe 75 PID 2604 wrote to memory of 2764 2604 explorer.exe 76 PID 2604 wrote to memory of 2764 2604 explorer.exe 76 PID 2604 wrote to memory of 2764 2604 explorer.exe 76 PID 2764 wrote to memory of 2812 2764 cmd.exe 78 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\45d03f6ba4d06819eb27a337042d9fa565f6aa1f1a2c547353253e5acf3441bdN.exe"C:\Users\Admin\AppData\Local\Temp\45d03f6ba4d06819eb27a337042d9fa565f6aa1f1a2c547353253e5acf3441bdN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\IME\es-ES\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Libraries\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Java\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Users\All Users\explorer.exe"C:\Users\All Users\explorer.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GW80Ek08hx.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2900
-
-
C:\Users\All Users\explorer.exe"C:\Users\All Users\explorer.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OVj8bjUD5N.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:2184
-
-
C:\Users\All Users\explorer.exe"C:\Users\All Users\explorer.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3dopRv074r.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2860
-
-
C:\Users\All Users\explorer.exe"C:\Users\All Users\explorer.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OZJpL0Zeaq.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:2812
-
-
C:\Users\All Users\explorer.exe"C:\Users\All Users\explorer.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3npectBbsF.bat"14⤵PID:2796
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:1816
-
-
C:\Users\All Users\explorer.exe"C:\Users\All Users\explorer.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\b9aNmsEibB.bat"16⤵PID:2320
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:1140
-
-
C:\Users\All Users\explorer.exe"C:\Users\All Users\explorer.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VbZulfStaN.bat"18⤵PID:880
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:576
-
-
C:\Users\All Users\explorer.exe"C:\Users\All Users\explorer.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IMpAoVHioU.bat"20⤵PID:2588
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:2220
-
-
C:\Users\All Users\explorer.exe"C:\Users\All Users\explorer.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Windows\IME\es-ES\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\IME\es-ES\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Windows\IME\es-ES\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Libraries\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Public\Libraries\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Libraries\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\All Users\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files\Java\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Java\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files\Java\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6dbc08f75a80704886910792286e3d
SHA13bf6751cd4e91729fb4312d264dad2751ec2a29a
SHA256cf03d829bbb98463c2d47dcfdf3bb10864d9918ea7eee9ec0e406269efd03e4b
SHA5122fdba427643de6709331eb921d83e67792780820496f8be0e3f2e5ac687a9c39fac74679680fedc62c3e7764ddb98ed10a81c409d9274c12c5a5bfee89bfbb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b144f29004cfd57a67eb6771b0cc179
SHA15f2553b76d642d16bc54d591cb3855a8b95e75bc
SHA2560dd5ff5fe5d28f5374b6282d55d62dd8ef910d8f5ad1903105a0c7f67aa3019a
SHA51264db5fcdd02c172fdafc36a6c7bf7d7c9f2503bda1c220b241b241b17670e63aa5cc61c0769d64c5cee9bc47a7b77827d5822a384b4a3d1c24559f845657ba87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b194861a054b269db0b300d1f47662
SHA130d7ef0f52698f69fb27143fe829d5b49cb3eb9c
SHA2567c1d1c31d0c793ff6e2c8de125d7fc0e28dd0748b20cf044924074a16e6ff84f
SHA5122ba1f6d76dc41cc82a7daded75d1bf6047a4de7317fe1d43e81d17bff0e7d45c0415b10cc3a00bc1a349a3e06a5203b7d1ef9b51514e49ba9ea85705fb384c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a745498b0dfb019e2010c7574f005132
SHA19c42ffbc4c7694fcda48675966de82c9d3bf0a01
SHA256010c7a29d0cbc61c9d78a4879fb7d4e0fdb511b6a3f670518f0b083451e93cf4
SHA512c95b0eba902040c463b112f91ed647aa3ee1c6e9111b0fd5ef37fef6b1bb1e81bb4431b7d5a8ddda2e431eae8af32086ca2df82d8c4277af72ad8484ca3caf52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab8965b439b4261f67f6e16401dde630
SHA12f9fbd09ab3ef877e2e32905cda33aa49ff84ad2
SHA256315bdaebbbbe99727100bf37a2b2f8a762ddd1115a1495c339531e1dbf997a61
SHA51241d97f74ecbfa7a8abd470083c96bcc2361fc4ff299f5f737e4dfa20ce6f7b770f6bd1013d337ed4aab75f16a25fb2dc7b091c7ff57f70c558db4d5b01990b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277bca0c7aa2e9f99d49c1ad53abddb8
SHA10f4098a23f449474c173c606ce991365cc213c95
SHA256c22da1125b3ab60aeb954b3c9358cb358e1c5dc691419f2520d972248c8a56a9
SHA5122ab5365c1abc9794cebb93423bfb252aab4c8be0bdd016b039b68a5416bf48600a2298a4083f28c59e82fb455f63bcbd2eb6f398951e967f6083b3f02aaa7859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5191d6e0ff3d679a74ec5be2e70d89f36
SHA1a89a7a3cd6c063422f8033684ba59215cf658fbb
SHA25617c3f24b037a5cd21824a7effca03f1cc3a3e4e8faea2e6c26fcf72574be8d9c
SHA512893a68a428e7e2f90ddca1f23b14550094f9af3af8434fcd3c5ae4455d52a267a94fc7dc663e932ebf7fdb50aa22505463132325391f197bdc64a864a8f1de3a
-
Filesize
196B
MD59221b65b998b075870be11c20770dcac
SHA125e4be462a565a5858262ffbd3dfd33982ac1878
SHA25655bf43b7953ac2e1a8c0839b7a77471bcffc697c1681ec41010027f073fb0106
SHA512eadba2f7be9a784d722482f59def80fad979638b6b4a52c0fd98db74f755aa43740c55ebb5773f5e91199f05f4e5387c4f1b9473a893a86fce5fb70e44483f4a
-
Filesize
196B
MD51a8b0d411144faa9570c7a06c5ef4419
SHA1c5442360b01703350df9041940ab6728fce49c38
SHA256d7db1e941ae16f0a5dc83c68a2989f71ccd6f7b08bf7032c8241458b318f8192
SHA51247a41e85d16bf9be1a176dc0f19eb01a11c7c4c663163883a7e69da6d915dcf061d27581164696668ba5c0954bb191c83d393b4d796637a6f1240a86928dd746
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
196B
MD575ea05cce5eeb4e3a4f8e82f1cc816dd
SHA14559db2c21d1a21acdf685b68dcc3132601e2907
SHA2561a41cb30a5ef1b198a87e8f420a0d25f98130ed386e063c10f06db42c9450216
SHA512ceb69bd615575901f23c3656834b8d84780c2975a2e8fee412da85cf871b887d137d5bd93184de12c93e06b7df86ff1265acb04820ad922ba1980fd83d8984dd
-
Filesize
196B
MD5ad68e486fbd78b6c198086c3f24499c1
SHA13016f64acea106a8aa94e93a5c93055297d521d3
SHA256465222b3a0d61dd6b7b0cc2d27e1fd09529f0ff78d2e9d78cc24d168c9cdfbc8
SHA512d76fd393272502005e9035dbd298f54828e61817cad1f706d679844366a2a48d26d358327b73c1ecb98e6e7972d27eddb61c53788d38b05e6147154f62ab44a1
-
Filesize
196B
MD5a9198e339eda0ad6609429acc1a25081
SHA10c0af98f6779e6b30b3340631eee51088efc5d58
SHA25600a5e606a571d1f1e9f93ad44d4674745de767e37400f9757534938d4d822af0
SHA5127b4b06d22c38e84021f9589b0c83ae1ed6de021a9c48b4e0a0af0b6111880db8cf8d5a1b288b2398f9733f9d0d3cc48ae51ea9fe9bd102318a3aa08e1562dc76
-
Filesize
196B
MD5a48b550bcbfb1247ea1f7a8691d3890c
SHA1f9a2d8c3ad9b8d41334d764746376c8facfbef9f
SHA25615fe3299992ffb5330c7857345d0eb670c723b7f7456bb1dcd087bd0e3f8322a
SHA51299858a9fc3c2bc17ca1d5fd6cc693fafe52748e696eed6651280d73d2f0be55d09c26c37b9b9ae41c3053c30e452890d09e95c66ff9d7daa85d45ab41613b6dc
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
196B
MD518574dea6f7d437a506b8b46d4e955bb
SHA1d5480d345a366c409b6cd3b26597f2681e54719c
SHA256acab285c952db0f47420526e6ec83aa47244995ed4d06839f06246c9f29f9aa1
SHA51222161bb18b88add1ca8d150608bbe40c444d8d2b74c4387c245c683008f4959ea065f8f1578257c9106b2bb67b9807365ec42d704c5a847e33914218066c3af0
-
Filesize
196B
MD5ebd8dad5d9832e180f0c9ababed88e44
SHA1a4346f83791890c4be6282c4cb44013eeb1e5e27
SHA256fc04befa195d46259242107892747a05791507cc002f5915b8f42fc42191e5a2
SHA512fc9aa19a11e2ad19c9c06ce85e2a63756fa483047a383c5f668d4a3a79cf9a3f7e547f30ceb93989e0208b84a4201f84a072a9f15c20ee7985deba3d83f0220f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58aab40acbbbce5cce9ac1cd48d0aaff7
SHA1dec5e40d941dc68c1eb493258895be882af6aaf2
SHA2561f3621a0fc38bb36bbd26ff802614e584b2f192679b55cac74dc4b8719fe97b4
SHA512f487d5a3c61b22cabf364276c49f6ca0112a0e07d68a7e5ddb65a4cb58fd3df352442dc4d6ca14acaec3028251520eda236944ec42ac456222070a6c940a107d
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394