Analysis
-
max time kernel
95s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 02:30
Behavioral task
behavioral1
Sample
69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe
Resource
win10v2004-20241007-en
General
-
Target
69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe
-
Size
2.3MB
-
MD5
861245da497c3a338b6df43fc75d90a4
-
SHA1
8acba2114d70f4482cda428b9c336c331af7340d
-
SHA256
69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd
-
SHA512
a438151c7a4daada0905a0ba8aaf9c04e610e5196ede9c1caaaeced49d410cc99afbc65ed6aa804e3e5f414a8e605a7d2a0b73faf029ba7442af058277e5cd09
-
SSDEEP
49152:vXBdiJZutsBAIJYCRqtFaDVTNOQwwqngiklt7D12OqulqAlOdLH:niJZFOIJHRqyNOQwLdkltfIeqtdLH
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 42 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3232 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4152 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2716 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3216 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2536 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4708 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3528 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4864 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4900 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4064 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 244 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4772 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4784 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2824 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4300 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1028 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3332 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3476 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 444 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5000 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4412 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4056 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4620 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2004 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4668 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3276 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4196 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 856 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1440 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4732 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4416 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1544 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4524 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3580 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1196 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3084 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 2852 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 2852 schtasks.exe 83 -
resource yara_rule behavioral2/memory/1364-1-0x0000000000910000-0x0000000000B62000-memory.dmp dcrat behavioral2/files/0x0007000000023c8f-20.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe -
Executes dropped EXE 1 IoCs
pid Process 4936 smss.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\en-US\csrss.exe 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files (x86)\Windows Mail\6ccacd8608530f 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\wininit.exe 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\fontdrvhost.exe 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\winlogon.exe 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files (x86)\Reference Assemblies\69ddcba757bf72 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\56085415360792 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files\Internet Explorer\SIGNUP\9e8d7a4ca61bd9 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files (x86)\Google\Temp\dwm.exe 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files (x86)\Windows Media Player\en-US\886983d96e3d3e 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\cc11b995f2a76d 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files (x86)\Reference Assemblies\smss.exe 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\5b884080fd4f94 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files (x86)\Google\Temp\6cb0b6c459d5d3 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files (x86)\Windows Mail\Idle.exe 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files\ModifiableWindowsApps\taskhostw.exe 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Program Files\Internet Explorer\SIGNUP\RuntimeBroker.exe 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\ShellComponents\wininit.exe 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Windows\ShellComponents\56085415360792 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Windows\rescache\taskhostw.exe 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Windows\Provisioning\Packages\sihost.exe 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe File created C:\Windows\Provisioning\Packages\66fc9ff0ee96c2 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1028 schtasks.exe 3084 schtasks.exe 1088 schtasks.exe 4152 schtasks.exe 3528 schtasks.exe 4784 schtasks.exe 4412 schtasks.exe 4668 schtasks.exe 1780 schtasks.exe 1544 schtasks.exe 2008 schtasks.exe 3216 schtasks.exe 244 schtasks.exe 3476 schtasks.exe 4416 schtasks.exe 4064 schtasks.exe 2536 schtasks.exe 444 schtasks.exe 4056 schtasks.exe 4196 schtasks.exe 3232 schtasks.exe 5000 schtasks.exe 2004 schtasks.exe 3276 schtasks.exe 4236 schtasks.exe 2220 schtasks.exe 3332 schtasks.exe 4708 schtasks.exe 4620 schtasks.exe 856 schtasks.exe 1196 schtasks.exe 2716 schtasks.exe 4900 schtasks.exe 4772 schtasks.exe 2384 schtasks.exe 1440 schtasks.exe 4732 schtasks.exe 4864 schtasks.exe 4300 schtasks.exe 4524 schtasks.exe 3580 schtasks.exe 2824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 4936 smss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe Token: SeDebugPrivilege 4936 smss.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2204 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 126 PID 1364 wrote to memory of 2204 1364 69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe 126 PID 2204 wrote to memory of 3780 2204 cmd.exe 128 PID 2204 wrote to memory of 3780 2204 cmd.exe 128 PID 2204 wrote to memory of 4936 2204 cmd.exe 130 PID 2204 wrote to memory of 4936 2204 cmd.exe 130 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe"C:\Users\Admin\AppData\Local\Temp\69846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WjVQoBKkou.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3780
-
-
C:\Program Files (x86)\Reference Assemblies\smss.exe"C:\Program Files (x86)\Reference Assemblies\smss.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Windows\ShellComponents\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\ShellComponents\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Windows\ShellComponents\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Microsoft OneDrive\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft OneDrive\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Microsoft OneDrive\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Media Player\en-US\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Media Player\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Mail\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Mail\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Reference Assemblies\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Reference Assemblies\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files\Internet Explorer\SIGNUP\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\SIGNUP\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files\Internet Explorer\SIGNUP\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Google\Temp\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\Temp\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 6 /tr "'C:\Windows\Provisioning\Packages\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\Provisioning\Packages\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Windows\Provisioning\Packages\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5861245da497c3a338b6df43fc75d90a4
SHA18acba2114d70f4482cda428b9c336c331af7340d
SHA25669846f46913239164023e3ccb5da768a51dd68e8865ff90695f1ab54ff2f50dd
SHA512a438151c7a4daada0905a0ba8aaf9c04e610e5196ede9c1caaaeced49d410cc99afbc65ed6aa804e3e5f414a8e605a7d2a0b73faf029ba7442af058277e5cd09
-
Filesize
217B
MD52ffc53049db8162dbeae1b44cd3d0729
SHA1c3397cf51a68b6367a37ae1438fd3e89167496db
SHA256826cb965adea8539c0ced19381b07f65d8dd8dd82c371bc8516438e15435cd6f
SHA5125556f4b5c74cfb0c2de8dcb03d686bb43025c1a878576cc1999b862dddb239805b27d207bd50e5354d035bc6b732fe8c4e221698a57028ba2d6081dec6968d39