Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 05:25
Behavioral task
behavioral1
Sample
b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe
Resource
win10v2004-20241007-en
General
-
Target
b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe
-
Size
2.3MB
-
MD5
95ce095073ce57e823674de34b621cdb
-
SHA1
129a46af1ad0ad1a15f6f3df3e1ee5e1147ae004
-
SHA256
b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72
-
SHA512
e16251a67637a09771d3962fca4fa92ac5f58483cff8cbf29c94f0eb0237f30deed49036a724cff32b0942715334865c2bb06084fefb0872551181c8e6accb28
-
SSDEEP
49152:bSrudTH6WUww8iz704mELP36hEgMMFzFOIh:GrudTHu0ivwELP38MMhFOIh
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 216 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 528 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 436 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2484 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1104 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3772 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1196 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1800 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3872 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 628 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3468 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2716 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3440 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4912 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3632 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3688 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 220 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4532 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3888 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4584 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4348 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4448 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3092 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1040 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2824 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2132 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 4568 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 212 4568 schtasks.exe 82 -
resource yara_rule behavioral2/memory/4548-1-0x0000000000180000-0x00000000003D0000-memory.dmp dcrat behavioral2/files/0x0007000000023ca4-19.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 sihost.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Windows Mail\csrss.exe b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Program Files\Windows Mail\886983d96e3d3e b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\fontdrvhost.exe b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\5b884080fd4f94 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Program Files\Microsoft Office\root\Templates\upfc.exe b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Program Files\Microsoft Office\root\Templates\ea1d8f6d871115 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Program Files\Crashpad\attachments\sysmon.exe b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Program Files\Crashpad\attachments\121e5b5079f7c0 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\IdentityCRL\5b884080fd4f94 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Windows\Containers\sihost.exe b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Windows\Containers\66fc9ff0ee96c2 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Windows\PrintDialog\en-US\dllhost.exe b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Windows\twain_32\Registry.exe b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File opened for modification C:\Windows\twain_32\Registry.exe b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Windows\twain_32\ee2ad38f3d4382 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Windows\Vss\Writers\Application\TextInputHost.exe b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Windows\Vss\Writers\Application\22eafd247d37c3 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Windows\IdentityCRL\fontdrvhost.exe b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe File created C:\Windows\servicing\fr-FR\RuntimeBroker.exe b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1920 schtasks.exe 3092 schtasks.exe 3772 schtasks.exe 628 schtasks.exe 2996 schtasks.exe 1040 schtasks.exe 528 schtasks.exe 8 schtasks.exe 3888 schtasks.exe 4912 schtasks.exe 1712 schtasks.exe 2084 schtasks.exe 1284 schtasks.exe 216 schtasks.exe 1800 schtasks.exe 3440 schtasks.exe 4532 schtasks.exe 4448 schtasks.exe 972 schtasks.exe 3872 schtasks.exe 220 schtasks.exe 1104 schtasks.exe 3468 schtasks.exe 3688 schtasks.exe 2024 schtasks.exe 2736 schtasks.exe 2132 schtasks.exe 2484 schtasks.exe 1196 schtasks.exe 2716 schtasks.exe 436 schtasks.exe 4584 schtasks.exe 212 schtasks.exe 3632 schtasks.exe 4348 schtasks.exe 2824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 2296 sihost.exe 2296 sihost.exe 2296 sihost.exe 2296 sihost.exe 2296 sihost.exe 2296 sihost.exe 2296 sihost.exe 2296 sihost.exe 2296 sihost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe Token: SeDebugPrivilege 2296 sihost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4548 wrote to memory of 4136 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 119 PID 4548 wrote to memory of 4136 4548 b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe 119 PID 4136 wrote to memory of 2264 4136 cmd.exe 121 PID 4136 wrote to memory of 2264 4136 cmd.exe 121 PID 4136 wrote to memory of 2296 4136 cmd.exe 122 PID 4136 wrote to memory of 2296 4136 cmd.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe"C:\Users\Admin\AppData\Local\Temp\b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aSjoVyoYUV.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2264
-
-
C:\Windows\Containers\sihost.exe"C:\Windows\Containers\sihost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Windows\twain_32\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\twain_32\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Windows\twain_32\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Mail\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Mail\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Windows\Vss\Writers\Application\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\Vss\Writers\Application\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Windows\Vss\Writers\Application\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Windows\IdentityCRL\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\IdentityCRL\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Windows\IdentityCRL\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Windows\Containers\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\Containers\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:8
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Windows\Containers\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Program Files\Microsoft Office\root\Templates\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\root\Templates\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office\root\Templates\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 11 /tr "'C:\Program Files\Crashpad\attachments\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files\Crashpad\attachments\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Program Files\Crashpad\attachments\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\WindowsHolographicDevices\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\All Users\WindowsHolographicDevices\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\WindowsHolographicDevices\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD595ce095073ce57e823674de34b621cdb
SHA1129a46af1ad0ad1a15f6f3df3e1ee5e1147ae004
SHA256b90b75dcc06003408ea406424ae16179137d2a39d2092d26c25677122479ed72
SHA512e16251a67637a09771d3962fca4fa92ac5f58483cff8cbf29c94f0eb0237f30deed49036a724cff32b0942715334865c2bb06084fefb0872551181c8e6accb28
-
Filesize
197B
MD5f8fe328489ca5b82610ebfe1fd3d6ff9
SHA1ca78fb1509c6639b71f962b54a49b04f6917094c
SHA256bf7dfb59639a028047cdde6240f90c59f7d94c919b39ed60f7662817d5235396
SHA51261d61d808b52752bde2ba7a8e009e7e8e4784eb9bdff2329d2e5ee41ea9d44d5bd3cf9a015d9251a992a656476b6d89ccd5bd177a204a99c20e3e0bb5aba54c0