Analysis
-
max time kernel
115s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 13:23
Behavioral task
behavioral1
Sample
e0b9d845687a3f35dfabaf846e7ab27cf81ae71f2547c766388f673a6fae4989.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e0b9d845687a3f35dfabaf846e7ab27cf81ae71f2547c766388f673a6fae4989.exe
Resource
win10v2004-20241007-en
General
-
Target
e0b9d845687a3f35dfabaf846e7ab27cf81ae71f2547c766388f673a6fae4989.exe
-
Size
1.3MB
-
MD5
79b1a0cdae6583e4d604d00a75498b08
-
SHA1
fec0ee3f87134e97067e6ac20c77d88575f13e27
-
SHA256
e0b9d845687a3f35dfabaf846e7ab27cf81ae71f2547c766388f673a6fae4989
-
SHA512
c2705b342a1dca2e9669fe7540f384192db9b9897e28b99ae48e3281a356213b66093517aa2dd8a370f657531657539603e4ed4db29b81419c49edbc2e2af5db
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjCR:UbA30GnzV/q+DnsXg3
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2784 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2684 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 320 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2464 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2680 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 740 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 560 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 852 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1464 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2364 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 940 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2716 2140 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1728 2140 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0007000000016cab-12.dat dcrat behavioral1/memory/2724-13-0x00000000011B0000-0x00000000012C0000-memory.dmp dcrat behavioral1/memory/1724-55-0x0000000000030000-0x0000000000140000-memory.dmp dcrat behavioral1/memory/648-140-0x0000000000150000-0x0000000000260000-memory.dmp dcrat behavioral1/memory/1716-200-0x0000000001000000-0x0000000001110000-memory.dmp dcrat behavioral1/memory/2796-438-0x00000000000C0000-0x00000000001D0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2176 powershell.exe 2564 powershell.exe 2252 powershell.exe 528 powershell.exe 1348 powershell.exe 1156 powershell.exe 2056 powershell.exe 1100 powershell.exe 1812 powershell.exe -
Executes dropped EXE 8 IoCs
pid Process 2724 DllCommonsvc.exe 1724 WMIADAP.exe 648 WMIADAP.exe 1716 WMIADAP.exe 1580 WMIADAP.exe 236 WMIADAP.exe 2744 WMIADAP.exe 2796 WMIADAP.exe -
Loads dropped DLL 2 IoCs
pid Process 868 cmd.exe 868 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 22 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com 9 raw.githubusercontent.com 12 raw.githubusercontent.com 16 raw.githubusercontent.com 19 raw.githubusercontent.com -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\es-ES\WMIADAP.exe DllCommonsvc.exe File created C:\Program Files\Windows Media Player\es-ES\75a57c1bdf437c DllCommonsvc.exe File created C:\Program Files (x86)\MSBuild\Microsoft\lsass.exe DllCommonsvc.exe File created C:\Program Files (x86)\MSBuild\Microsoft\6203df4a6bafc7 DllCommonsvc.exe File created C:\Program Files (x86)\Google\CrashReports\smss.exe DllCommonsvc.exe File created C:\Program Files (x86)\Google\CrashReports\69ddcba757bf72 DllCommonsvc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\system\dwm.exe DllCommonsvc.exe File created C:\Windows\system\6cb0b6c459d5d3 DllCommonsvc.exe File created C:\Windows\Globalization\ELS\taskhost.exe DllCommonsvc.exe File created C:\Windows\Globalization\ELS\b75386f1303e64 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0b9d845687a3f35dfabaf846e7ab27cf81ae71f2547c766388f673a6fae4989.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 560 schtasks.exe 2784 schtasks.exe 2464 schtasks.exe 2276 schtasks.exe 1616 schtasks.exe 3016 schtasks.exe 2608 schtasks.exe 740 schtasks.exe 1888 schtasks.exe 3004 schtasks.exe 2716 schtasks.exe 2920 schtasks.exe 2676 schtasks.exe 320 schtasks.exe 852 schtasks.exe 1728 schtasks.exe 2684 schtasks.exe 2680 schtasks.exe 1916 schtasks.exe 2364 schtasks.exe 2860 schtasks.exe 1464 schtasks.exe 2572 schtasks.exe 940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2724 DllCommonsvc.exe 1100 powershell.exe 1812 powershell.exe 2176 powershell.exe 528 powershell.exe 2564 powershell.exe 1348 powershell.exe 2056 powershell.exe 1156 powershell.exe 2252 powershell.exe 1724 WMIADAP.exe 648 WMIADAP.exe 1716 WMIADAP.exe 1580 WMIADAP.exe 236 WMIADAP.exe 2744 WMIADAP.exe 2796 WMIADAP.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2724 DllCommonsvc.exe Token: SeDebugPrivilege 1724 WMIADAP.exe Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 1812 powershell.exe Token: SeDebugPrivilege 2176 powershell.exe Token: SeDebugPrivilege 528 powershell.exe Token: SeDebugPrivilege 2564 powershell.exe Token: SeDebugPrivilege 1348 powershell.exe Token: SeDebugPrivilege 2056 powershell.exe Token: SeDebugPrivilege 1156 powershell.exe Token: SeDebugPrivilege 2252 powershell.exe Token: SeDebugPrivilege 648 WMIADAP.exe Token: SeDebugPrivilege 1716 WMIADAP.exe Token: SeDebugPrivilege 1580 WMIADAP.exe Token: SeDebugPrivilege 236 WMIADAP.exe Token: SeDebugPrivilege 2744 WMIADAP.exe Token: SeDebugPrivilege 2796 WMIADAP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1516 2280 e0b9d845687a3f35dfabaf846e7ab27cf81ae71f2547c766388f673a6fae4989.exe 31 PID 2280 wrote to memory of 1516 2280 e0b9d845687a3f35dfabaf846e7ab27cf81ae71f2547c766388f673a6fae4989.exe 31 PID 2280 wrote to memory of 1516 2280 e0b9d845687a3f35dfabaf846e7ab27cf81ae71f2547c766388f673a6fae4989.exe 31 PID 2280 wrote to memory of 1516 2280 e0b9d845687a3f35dfabaf846e7ab27cf81ae71f2547c766388f673a6fae4989.exe 31 PID 1516 wrote to memory of 868 1516 WScript.exe 32 PID 1516 wrote to memory of 868 1516 WScript.exe 32 PID 1516 wrote to memory of 868 1516 WScript.exe 32 PID 1516 wrote to memory of 868 1516 WScript.exe 32 PID 868 wrote to memory of 2724 868 cmd.exe 34 PID 868 wrote to memory of 2724 868 cmd.exe 34 PID 868 wrote to memory of 2724 868 cmd.exe 34 PID 868 wrote to memory of 2724 868 cmd.exe 34 PID 2724 wrote to memory of 2056 2724 DllCommonsvc.exe 60 PID 2724 wrote to memory of 2056 2724 DllCommonsvc.exe 60 PID 2724 wrote to memory of 2056 2724 DllCommonsvc.exe 60 PID 2724 wrote to memory of 2176 2724 DllCommonsvc.exe 61 PID 2724 wrote to memory of 2176 2724 DllCommonsvc.exe 61 PID 2724 wrote to memory of 2176 2724 DllCommonsvc.exe 61 PID 2724 wrote to memory of 2564 2724 DllCommonsvc.exe 62 PID 2724 wrote to memory of 2564 2724 DllCommonsvc.exe 62 PID 2724 wrote to memory of 2564 2724 DllCommonsvc.exe 62 PID 2724 wrote to memory of 1100 2724 DllCommonsvc.exe 63 PID 2724 wrote to memory of 1100 2724 DllCommonsvc.exe 63 PID 2724 wrote to memory of 1100 2724 DllCommonsvc.exe 63 PID 2724 wrote to memory of 2252 2724 DllCommonsvc.exe 64 PID 2724 wrote to memory of 2252 2724 DllCommonsvc.exe 64 PID 2724 wrote to memory of 2252 2724 DllCommonsvc.exe 64 PID 2724 wrote to memory of 528 2724 DllCommonsvc.exe 65 PID 2724 wrote to memory of 528 2724 DllCommonsvc.exe 65 PID 2724 wrote to memory of 528 2724 DllCommonsvc.exe 65 PID 2724 wrote to memory of 1812 2724 DllCommonsvc.exe 66 PID 2724 wrote to memory of 1812 2724 DllCommonsvc.exe 66 PID 2724 wrote to memory of 1812 2724 DllCommonsvc.exe 66 PID 2724 wrote to memory of 1348 2724 DllCommonsvc.exe 67 PID 2724 wrote to memory of 1348 2724 DllCommonsvc.exe 67 PID 2724 wrote to memory of 1348 2724 DllCommonsvc.exe 67 PID 2724 wrote to memory of 1156 2724 DllCommonsvc.exe 68 PID 2724 wrote to memory of 1156 2724 DllCommonsvc.exe 68 PID 2724 wrote to memory of 1156 2724 DllCommonsvc.exe 68 PID 2724 wrote to memory of 1724 2724 DllCommonsvc.exe 78 PID 2724 wrote to memory of 1724 2724 DllCommonsvc.exe 78 PID 2724 wrote to memory of 1724 2724 DllCommonsvc.exe 78 PID 1724 wrote to memory of 2248 1724 WMIADAP.exe 79 PID 1724 wrote to memory of 2248 1724 WMIADAP.exe 79 PID 1724 wrote to memory of 2248 1724 WMIADAP.exe 79 PID 2248 wrote to memory of 1268 2248 cmd.exe 81 PID 2248 wrote to memory of 1268 2248 cmd.exe 81 PID 2248 wrote to memory of 1268 2248 cmd.exe 81 PID 2248 wrote to memory of 648 2248 cmd.exe 82 PID 2248 wrote to memory of 648 2248 cmd.exe 82 PID 2248 wrote to memory of 648 2248 cmd.exe 82 PID 648 wrote to memory of 1152 648 WMIADAP.exe 83 PID 648 wrote to memory of 1152 648 WMIADAP.exe 83 PID 648 wrote to memory of 1152 648 WMIADAP.exe 83 PID 1152 wrote to memory of 1156 1152 cmd.exe 85 PID 1152 wrote to memory of 1156 1152 cmd.exe 85 PID 1152 wrote to memory of 1156 1152 cmd.exe 85 PID 1152 wrote to memory of 1716 1152 cmd.exe 86 PID 1152 wrote to memory of 1716 1152 cmd.exe 86 PID 1152 wrote to memory of 1716 1152 cmd.exe 86 PID 1716 wrote to memory of 1812 1716 WMIADAP.exe 87 PID 1716 wrote to memory of 1812 1716 WMIADAP.exe 87 PID 1716 wrote to memory of 1812 1716 WMIADAP.exe 87 PID 1812 wrote to memory of 2552 1812 cmd.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0b9d845687a3f35dfabaf846e7ab27cf81ae71f2547c766388f673a6fae4989.exe"C:\Users\Admin\AppData\Local\Temp\e0b9d845687a3f35dfabaf846e7ab27cf81ae71f2547c766388f673a6fae4989.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\system\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Media Player\es-ES\WMIADAP.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\MSBuild\Microsoft\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Globalization\ELS\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\CrashReports\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CPhDZIwY3l.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:1268
-
-
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7aJ3FmDw0K.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:1156
-
-
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LnIbptgF5R.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2552
-
-
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uSuCPwp4Rh.bat"12⤵PID:2700
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:1136
-
-
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:236 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Wqkq749RcZ.bat"14⤵PID:1528
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:1828
-
-
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jBrSCX6wbi.bat"16⤵PID:2480
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:2408
-
-
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\providercommon\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\providercommon\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 7 /tr "'C:\providercommon\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Windows\system\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\system\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Windows\system\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Media Player\es-ES\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\es-ES\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Media Player\es-ES\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Windows\Globalization\ELS\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\Globalization\ELS\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Windows\Globalization\ELS\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Google\CrashReports\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Google\CrashReports\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52161ac4693b7549c8a79f1eae31057b7
SHA1ea6c8697f1969a5fe90c0ecf60afcd1b8280042f
SHA2565686aef877bf76f9669340d02ee26d0ad8145e221d49d08ec2f641981f430300
SHA512e7d195de41be78aa47c424a9870e03b0de514dfd87d19a0888ec5a37d75eb075bd6aede72340a1e4fe9493c5ef6a95e0478e0b06df2128658b947d73864a438d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb56990b4989930447b90c89cc58c8b6
SHA1b7989e1fe09434a2020d6719fc6fe493770b196a
SHA256431059b5f9cf417ccbd12d3d389860d33478f6d241148403c96d089ecbec59fc
SHA512e845333509e11417b06117c0dab8df5dd8c51194522593b3097c6c45afdcfd9fde7ba2c4d18304882c271af8c18c09e02225dcad20f6cfcbbd845b0f75a237ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef515cf6f5e072ffb9ffd1b8eb09cd11
SHA17e9b4218df82bb050d0437f269cc3d4e33799f0e
SHA25654ce8be3fa73465646375d5acd04695cd881cc66ed0e78edb3eda01617cb3508
SHA5125de52724ada57bcec9df569b734bfa7bf21539e6fe1ebe13cea6065a0724454fa09cb9fc6caffc5b99024e046efc60c4108585e57b83b5e0492c9895f76bbd76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afd6eb143e8f68d5cb317dc32b702519
SHA12c72ff0561a4157ed2ee94bc29b9a6d9e1648dc4
SHA25665952c447c188224bc1ce4e6fb0af896ec88502be1079b6f0ad41c7cb8f18a6a
SHA512cd36d19d6086ff2b1c679d8739617893e3263d64e834853c4f3bc262b9fa8521348f92989b2ffda749269002c9030851b79000c5de47235e8540ba3e2a9f3bf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1ceb5d4afe00841ba8a4a4d71ec5ed4
SHA1b31aaacb6d52918b8c2f2dd02ec4a5d3c5d8bc23
SHA256b84f9d402d7f24c373f4abfb1a69c54f72f0fb023f8df35cbdb1f50581092150
SHA51260add3f91b07e905bd6fada08f3a6590d9777210fa6470cecf5627a64cdeb0cc278fb97890bf4810264dd4a7459571271e87818b6b7caff73e95c259e134ac97
-
Filesize
239B
MD53c438a400dc61c30dda366a5773bf211
SHA1b6f650f8f3a6afc4110355f680e586d09c462f70
SHA256e2ffc3ab14b65aa795b813e5d735dd19c86f39dfa6edac8b1b76a437300103c5
SHA5122e5f72c626bdd9e29d8bba1fd0ded07b511e65fc806b6b5534b50b746a9bb9a823bf0b7ed3b7c9dd92d365894764efec438a67e849494e3f42e0044babc2594e
-
Filesize
239B
MD52aeb19ff1b6d9ad9bee97e5216f5aa42
SHA11022959c44557f5095e31a5a2c9e7fb7c5eb6af8
SHA256311cdf49fb030949cc7918a43fadee4addd11695d3a22968773399cf5a5b195c
SHA5120066796a14b750df0b15ec9f3696bbfcd7bd25854553aef68cb1c7f172b366c81260f67a7c33d34b2e311e77041058eaff43503782388ab4fb7bc4a84988f7b4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
239B
MD52ce782b040696d7e7d18e4d28c5d63d1
SHA1333d84e2d26fcd6cb4b76a9595af76956428794c
SHA256ce0c01e025c1250f5a99943dff162be5b62c352dcf6cded8bb7879c6d2956485
SHA5120237a40b444341987e3d3057c3378e92a70ac80940174448d8801853ec3e680077fbca33c994f404a73dfbf68483c67d3a502e2011b5df7b3ecffa07958e98cb
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
239B
MD568f55295b41bc2b373b7457579a02926
SHA19bae00ccb327cd405dd5ccb0e1bee637d05b053b
SHA256e7d343a905e5fa752a9e1034b33bff79ed29fbab6f095944586fb533fd5567bf
SHA512d2af2181a3e139e023aa450e89f3f8d76859db69cc0647ac2382cb3350fed59339f01640d4617b0f2a7b033fcd7fc65813e6ac96c4999ec0923faa5bfde67552
-
Filesize
239B
MD5fcb02eaad2248f794f30d14e7d6dfd44
SHA1e7727cc4738b321302b8578233e04aa525dfff28
SHA256f07693a64f829649871233032f92731f6763a86342e363579ade056167e6ebc7
SHA5125360915f2eda05ca0fdcef9c071631c7ba8e9d6ade6cafc68230945ce0b4a4cece8ba04274ae480712fbf87ed8886943f97026c5d72140499f76be572d3b212f
-
Filesize
239B
MD55414cd1621597e7cc3e30f97cf353d2b
SHA1636812dbd3d9b184dea40debc21c5ec14b5fd612
SHA25684c26714c1a43e95cf149e3a17b7aaae509df017c95173fae293dc831ea3dae3
SHA512f774081355cab070cc38fda5b5ee5ec2e8134d35bf5e27ccde56dc6c43c00d55dc5827864b38cec5b663435bc0214b3db7bb394f024f3ad62ffda04be44690b2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\I6YKCKHDAC4491ZJ11LZ.temp
Filesize7KB
MD5ddf840509e0348e9da11c6d5a7ac83d9
SHA1f1a61de0d7a1ba47b7c37901dfcf43afa5c3d769
SHA2562b40e1a57dbbce26369cc3c0754d8bf32e70070a9ae0b0f3a551470b5417a404
SHA512429c44918edd6adbafe53232325eed4dc77d52ea504e8aef6d807eb5a7e45ef93133874056bc4ef9c2a2057a3a398b75b8ea7f99401c9448fc07a53f55189550
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478