Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 13:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe
-
Size
3.3MB
-
MD5
c95ac454cf5cab75cd487ccb82ee5d2a
-
SHA1
5098362ca55b5c1b4e22685f5a3fd7d2752df2e9
-
SHA256
91704a8d50393554e16e3cb1c4323a1ac3fd69ec86c503f86cf2736965abea3b
-
SHA512
782cb16c300eb5dad7862772aa6072224884349f64de5e876ce59bd2d7cf6ecaf4ffd096c3fb825404821394538f6950990c19b26182cdd4ef29f2bed331f8ce
-
SSDEEP
98304:jLozdB/qu2Ae/tYgFgYYU9xA+X6PwBZ9McLu:vozdYBYU9UwBZDu
Malware Config
Signatures
-
DcRat 14 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 3060 schtasks.exe 1108 schtasks.exe 2848 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Documents and Settings\\csrss.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2928 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2924 schtasks.exe 1548 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\System32\\wmpps\\lsass.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\System32\\netbios\\smss.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2908 schtasks.exe 2676 schtasks.exe 2024 schtasks.exe 2716 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 10 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2716 2960 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2848 2960 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 2960 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1108 2960 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1548 2960 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 2960 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 2960 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 2960 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 2960 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 2960 schtasks.exe 31 -
resource yara_rule behavioral1/memory/1708-2-0x0000000000AD0000-0x00000000012C8000-memory.dmp dcrat behavioral1/memory/1708-3-0x0000000000AD0000-0x00000000012C8000-memory.dmp dcrat behavioral1/memory/1708-17-0x0000000000AD0000-0x00000000012C8000-memory.dmp dcrat behavioral1/memory/2620-21-0x00000000012B0000-0x0000000001AA8000-memory.dmp dcrat behavioral1/memory/2620-22-0x00000000012B0000-0x0000000001AA8000-memory.dmp dcrat behavioral1/memory/2620-50-0x00000000012B0000-0x0000000001AA8000-memory.dmp dcrat behavioral1/memory/1728-52-0x0000000001150000-0x0000000001948000-memory.dmp dcrat behavioral1/memory/1728-53-0x0000000001150000-0x0000000001948000-memory.dmp dcrat behavioral1/memory/1728-67-0x0000000001150000-0x0000000001948000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe -
Executes dropped EXE 1 IoCs
pid Process 1728 explorer.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\System32\\wmpps\\lsass.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\System32\\netbios\\smss.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\MSOCache\\All Users\\explorer.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Users\\Public\\Recorded TV\\Sample Media\\lsm.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Windows\\System32\\korean\\taskhost.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Documents and Settings\\csrss.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\NlsData004e\\csrss.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\C_10002\\lsm.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Users\\Default User\\services.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Windows\\tracing\\sppsvc.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File opened for modification \??\PhysicalDrive0 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File opened for modification \??\PhysicalDrive0 explorer.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\NlsData004e\886983d96e3d3e31032c679b2d4ea91b6c05afef JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\wmpps\lsass.exe JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\wmpps\6203df4a6bafc7c328ee7f6f8ca0a8a838a8a1b9 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\netbios\69ddcba757bf72f7d36c464c71f42baab150b2b9 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\NlsData004e\csrss.exe JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File opened for modification C:\Windows\SysWOW64\NlsData004e\csrss.exe JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\netbios\smss.exe JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\C_10002\lsm.exe JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\C_10002\101b941d020240259ca4912829b53995ad543df6 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\korean\taskhost.exe JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\korean\b75386f1303e64d8139363b71e44ac16341adf4e JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1708 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 1728 explorer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\tracing\sppsvc.exe JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\tracing\0a1fd5f707cd16ea89afd3d6db52b2da58214a6c JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32tm.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2676 schtasks.exe 2924 schtasks.exe 2716 schtasks.exe 2848 schtasks.exe 1548 schtasks.exe 2908 schtasks.exe 3060 schtasks.exe 1108 schtasks.exe 2024 schtasks.exe 2928 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1708 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 1708 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe 1728 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1708 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Token: SeDebugPrivilege 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Token: SeDebugPrivilege 1728 explorer.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2644 1708 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 35 PID 1708 wrote to memory of 2644 1708 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 35 PID 1708 wrote to memory of 2644 1708 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 35 PID 1708 wrote to memory of 2644 1708 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 35 PID 2644 wrote to memory of 3000 2644 cmd.exe 37 PID 2644 wrote to memory of 3000 2644 cmd.exe 37 PID 2644 wrote to memory of 3000 2644 cmd.exe 37 PID 2644 wrote to memory of 3000 2644 cmd.exe 37 PID 3000 wrote to memory of 2968 3000 w32tm.exe 38 PID 3000 wrote to memory of 2968 3000 w32tm.exe 38 PID 3000 wrote to memory of 2968 3000 w32tm.exe 38 PID 3000 wrote to memory of 2968 3000 w32tm.exe 38 PID 2644 wrote to memory of 2620 2644 cmd.exe 39 PID 2644 wrote to memory of 2620 2644 cmd.exe 39 PID 2644 wrote to memory of 2620 2644 cmd.exe 39 PID 2644 wrote to memory of 2620 2644 cmd.exe 39 PID 2620 wrote to memory of 1728 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 47 PID 2620 wrote to memory of 1728 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 47 PID 2620 wrote to memory of 1728 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 47 PID 2620 wrote to memory of 1728 2620 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe"1⤵
- DcRat
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uBMujHlZ86.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:2968
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\MSOCache\All Users\explorer.exe"C:\MSOCache\All Users\explorer.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Documents and Settings\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\wmpps\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\netbios\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\NlsData004e\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\C_10002\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default User\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\tracing\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Users\Public\Recorded TV\Sample Media\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\korean\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2928
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5c95ac454cf5cab75cd487ccb82ee5d2a
SHA15098362ca55b5c1b4e22685f5a3fd7d2752df2e9
SHA25691704a8d50393554e16e3cb1c4323a1ac3fd69ec86c503f86cf2736965abea3b
SHA512782cb16c300eb5dad7862772aa6072224884349f64de5e876ce59bd2d7cf6ecaf4ffd096c3fb825404821394538f6950990c19b26182cdd4ef29f2bed331f8ce
-
Filesize
16B
MD5f08fafc6e9da6af1aa9a2f3814c5f900
SHA17f7630cbdaed1d187655a901c988e85d923ee8d3
SHA256f65f6f16daef6659c359934a2307c8a75a180aec06c0fe6bb35bdca4cbf44227
SHA512f1dafc7a72bcb3b1e4247be67e0b3d67dfff59a494d17a4501a620dec3cbefee694e02408e483a06cb81dd36369493e755c9d4d06240f1d7059a97dc7c29820c
-
C:\Users\Admin\AppData\Local\Temp\6b47530fed616ea274ab4cbafdd494e0bd3cb4de3ddfe47bce8ce7ecac829aad996a7761ee1605d1
Filesize536B
MD50f2cf4cfa8f34ad1d0945067fdaa9a83
SHA1237f76486d7751cbcbb4ce9ebe308bfb6f28576a
SHA256b11025697c5e2a2a9fc264c4fb0a96820d6d89d058c15e481f554388e94a36e7
SHA5122d00a027e44a9f139ddefc814551f74288fb95b24c448809407288c80ca983d974cb40646618c8f685a3b625a9c6fc70af2b27b8f203c3716aa95333550040e4
-
Filesize
248B
MD5672497588b073b42480236aab50c2279
SHA108c7ab97814c7f6cf063b011e61451322081cd5d
SHA25668c93dc9d8278a416bfa15319408e938703b17c3a849648d4995c07679251f06
SHA512d4a8d72f5629997d5cff29de7227b20f6a5647faa2b4cb313d9bbbd6e57690cd1d373fe9b492caed8ff6ede6b44f0dba4bca1f89a12b2c25ab467b916e71683a