Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2025 03:27

General

  • Target

    e7fb15dc103eca61803e214b533fb4dd3fa3d4b171886f452eb6ab8353ee2aa6.exe

  • Size

    2.2MB

  • MD5

    50ee114bba99ce3a7ba3e64c0080a644

  • SHA1

    3c9f1189b07b612888a1124714d1586408c78ba0

  • SHA256

    e7fb15dc103eca61803e214b533fb4dd3fa3d4b171886f452eb6ab8353ee2aa6

  • SHA512

    58b94a8596d4a94b28da6f0051d90bf098d9def8a112d9541eca814c7b46f5bae619a331831c060eff04f39b62cac1a2ad2a5fe380c75f59aa79322e09a4b64d

  • SSDEEP

    49152:IBJaWLMtwyMxRizAwgueOJNN3lRHiKLWDWUs:yALwyMb9ue0NTH2Ps

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 17 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 16 IoCs
  • Runs ping.exe 1 TTPs 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7fb15dc103eca61803e214b533fb4dd3fa3d4b171886f452eb6ab8353ee2aa6.exe
    "C:\Users\Admin\AppData\Local\Temp\e7fb15dc103eca61803e214b533fb4dd3fa3d4b171886f452eb6ab8353ee2aa6.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3240
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\hyperIntoBroker\vN1MMUTrCtC1FtSWQe4vLUvQugg9bTGuni3V.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4820
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\hyperIntoBroker\7ZVJJhRLWkC.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3336
        • C:\hyperIntoBroker\hyperProviderbrokermonitorNet.exe
          "C:\hyperIntoBroker/hyperProviderbrokermonitorNet.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3160
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lhgaili1\lhgaili1.cmdline"
            5⤵
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:4528
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCDC0.tmp" "c:\Windows\System32\CSC1EDDCB862694B989EA675C75E9DC57D.TMP"
              6⤵
                PID:556
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3X3WTAD2eU.bat"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1432
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:2384
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  6⤵
                    PID:3640
                  • C:\Recovery\WindowsRE\WmiPrvSE.exe
                    "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                    6⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2884
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PLxqGDTluw.bat"
                      7⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2936
                      • C:\Windows\system32\chcp.com
                        chcp 65001
                        8⤵
                          PID:4408
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          8⤵
                            PID:4460
                          • C:\Recovery\WindowsRE\WmiPrvSE.exe
                            "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                            8⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:4804
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ybJBPcXt9a.bat"
                              9⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3652
                              • C:\Windows\system32\chcp.com
                                chcp 65001
                                10⤵
                                  PID:4604
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  10⤵
                                    PID:1992
                                  • C:\Recovery\WindowsRE\WmiPrvSE.exe
                                    "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                                    10⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:220
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Dl1lNRuX9F.bat"
                                      11⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:3292
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        12⤵
                                          PID:1260
                                        • C:\Windows\system32\w32tm.exe
                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                          12⤵
                                            PID:3940
                                          • C:\Recovery\WindowsRE\WmiPrvSE.exe
                                            "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                                            12⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Modifies registry class
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of WriteProcessMemory
                                            PID:1056
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YlsA6cJawy.bat"
                                              13⤵
                                              • Suspicious use of WriteProcessMemory
                                              PID:372
                                              • C:\Windows\system32\chcp.com
                                                chcp 65001
                                                14⤵
                                                  PID:1772
                                                • C:\Windows\system32\w32tm.exe
                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                  14⤵
                                                    PID:4092
                                                  • C:\Recovery\WindowsRE\WmiPrvSE.exe
                                                    "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                                                    14⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2632
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\h53aanzGdD.bat"
                                                      15⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:3136
                                                      • C:\Windows\system32\chcp.com
                                                        chcp 65001
                                                        16⤵
                                                          PID:1696
                                                        • C:\Windows\system32\w32tm.exe
                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          16⤵
                                                            PID:2708
                                                          • C:\Recovery\WindowsRE\WmiPrvSE.exe
                                                            "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                                                            16⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:3504
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qPEz3ygwJT.bat"
                                                              17⤵
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:4736
                                                              • C:\Windows\system32\chcp.com
                                                                chcp 65001
                                                                18⤵
                                                                  PID:3340
                                                                • C:\Windows\system32\PING.EXE
                                                                  ping -n 10 localhost
                                                                  18⤵
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:1336
                                                                • C:\Recovery\WindowsRE\WmiPrvSE.exe
                                                                  "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                                                                  18⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2584
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6L2ySswQ0j.bat"
                                                                    19⤵
                                                                      PID:5008
                                                                      • C:\Windows\system32\chcp.com
                                                                        chcp 65001
                                                                        20⤵
                                                                          PID:4804
                                                                        • C:\Windows\system32\w32tm.exe
                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                          20⤵
                                                                            PID:4488
                                                                          • C:\Recovery\WindowsRE\WmiPrvSE.exe
                                                                            "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                                                                            20⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:4604
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\grDS520PRI.bat"
                                                                              21⤵
                                                                                PID:2524
                                                                                • C:\Windows\system32\chcp.com
                                                                                  chcp 65001
                                                                                  22⤵
                                                                                    PID:716
                                                                                  • C:\Windows\system32\w32tm.exe
                                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                    22⤵
                                                                                      PID:1524
                                                                                    • C:\Recovery\WindowsRE\WmiPrvSE.exe
                                                                                      "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                                                                                      22⤵
                                                                                      • Checks computer location settings
                                                                                      • Executes dropped EXE
                                                                                      • Modifies registry class
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:380
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\T3REiUSKTh.bat"
                                                                                        23⤵
                                                                                          PID:3468
                                                                                          • C:\Windows\system32\chcp.com
                                                                                            chcp 65001
                                                                                            24⤵
                                                                                              PID:2556
                                                                                            • C:\Windows\system32\PING.EXE
                                                                                              ping -n 10 localhost
                                                                                              24⤵
                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                              • Runs ping.exe
                                                                                              PID:3720
                                                                                            • C:\Recovery\WindowsRE\WmiPrvSE.exe
                                                                                              "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                                                                                              24⤵
                                                                                              • Checks computer location settings
                                                                                              • Executes dropped EXE
                                                                                              • Modifies registry class
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:1056
                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2JnastWSjL.bat"
                                                                                                25⤵
                                                                                                  PID:4412
                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                    chcp 65001
                                                                                                    26⤵
                                                                                                      PID:4024
                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                      ping -n 10 localhost
                                                                                                      26⤵
                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                      • Runs ping.exe
                                                                                                      PID:2088
                                                                                                    • C:\Recovery\WindowsRE\WmiPrvSE.exe
                                                                                                      "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                                                                                                      26⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:3640
                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kE5LbAifMs.bat"
                                                                                                        27⤵
                                                                                                          PID:3804
                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                            chcp 65001
                                                                                                            28⤵
                                                                                                              PID:4172
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping -n 10 localhost
                                                                                                              28⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:3252
                                                                                                            • C:\Recovery\WindowsRE\WmiPrvSE.exe
                                                                                                              "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                                                                                                              28⤵
                                                                                                              • Checks computer location settings
                                                                                                              • Executes dropped EXE
                                                                                                              • Modifies registry class
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:4080
                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\grDS520PRI.bat"
                                                                                                                29⤵
                                                                                                                  PID:1600
                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                    chcp 65001
                                                                                                                    30⤵
                                                                                                                      PID:2936
                                                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                      30⤵
                                                                                                                        PID:3996
                                                                                                                      • C:\Recovery\WindowsRE\WmiPrvSE.exe
                                                                                                                        "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                                                                                                                        30⤵
                                                                                                                        • Checks computer location settings
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:184
                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BIMUOuvqlP.bat"
                                                                                                                          31⤵
                                                                                                                            PID:3508
                                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                                              chcp 65001
                                                                                                                              32⤵
                                                                                                                                PID:940
                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                ping -n 10 localhost
                                                                                                                                32⤵
                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                • Runs ping.exe
                                                                                                                                PID:2668
                                                                                                                              • C:\Recovery\WindowsRE\WmiPrvSE.exe
                                                                                                                                "C:\Recovery\WindowsRE\WmiPrvSE.exe"
                                                                                                                                32⤵
                                                                                                                                • Checks computer location settings
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Modifies registry class
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:4928
                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cTMYZuI8Vj.bat"
                                                                                                                                  33⤵
                                                                                                                                    PID:2132
                                                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                                                      chcp 65001
                                                                                                                                      34⤵
                                                                                                                                        PID:1820
                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                        ping -n 10 localhost
                                                                                                                                        34⤵
                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                        • Runs ping.exe
                                                                                                                                        PID:1904
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\Windows\Speech_OneCore\Engines\TTS\fr-FR\unsecapp.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2524
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Windows\Speech_OneCore\Engines\TTS\fr-FR\unsecapp.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:760
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\Windows\Speech_OneCore\Engines\TTS\fr-FR\unsecapp.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2312
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\hyperIntoBroker\csrss.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3468
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\hyperIntoBroker\csrss.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:624
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\hyperIntoBroker\csrss.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:5100
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\csrss.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:964
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3472
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:5056
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\WmiPrvSE.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1056
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\WmiPrvSE.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3564
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\WmiPrvSE.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3944
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\conhost.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3276
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Default User\conhost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1988
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\conhost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1852
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "hyperProviderbrokermonitorNeth" /sc MINUTE /mo 14 /tr "'C:\hyperIntoBroker\hyperProviderbrokermonitorNet.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2880
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "hyperProviderbrokermonitorNet" /sc ONLOGON /tr "'C:\hyperIntoBroker\hyperProviderbrokermonitorNet.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1616
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "hyperProviderbrokermonitorNeth" /sc MINUTE /mo 8 /tr "'C:\hyperIntoBroker\hyperProviderbrokermonitorNet.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:5048

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WmiPrvSE.exe.log

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      935ecb30a8e13f625a9a89e3b0fcbf8f

                                                                      SHA1

                                                                      41cb046b7b5f89955fd53949efad8e9f3971d731

                                                                      SHA256

                                                                      2a7b829afe6a140bb37d24cc7711749c20cdaaf9cc7c4a182ff081180b4d99e9

                                                                      SHA512

                                                                      1210281612b0101ce63555a1a7855589ff68e1eac5b8a2461e10808c5b92c5dd111be72406c2923a94e10b687ceda43dc24d8c22a49dab40a4af793ee6b740aa

                                                                    • C:\Users\Admin\AppData\Local\Temp\2JnastWSjL.bat

                                                                      Filesize

                                                                      162B

                                                                      MD5

                                                                      5f50f88461d786287f8545da2ecb37ec

                                                                      SHA1

                                                                      a06131d72f265bde00ff5663d993e7b3e0203917

                                                                      SHA256

                                                                      6477c74f5afb48b8b06fc766fd684aeec3c97fc7d78d460bcd46c3ae37282283

                                                                      SHA512

                                                                      aec29d073ae9c8644f7004360fc142029a2242e60b1a58715273eca2a2a5e6bf6e819eec3965bbc4cfd36581a65a10bdc6452e02f6d93dcf3c8734ff048d5610

                                                                    • C:\Users\Admin\AppData\Local\Temp\3X3WTAD2eU.bat

                                                                      Filesize

                                                                      210B

                                                                      MD5

                                                                      d5abc1087fdc210fcd82d4d81ccf5489

                                                                      SHA1

                                                                      6414582626bdb1a539bbc8ad53392980368ee45f

                                                                      SHA256

                                                                      ec89b905664eaf0ec17345ecf9b9ef458040238c2d0fc585977d6a53a8d80092

                                                                      SHA512

                                                                      836d32463e4eeb46af1fecbe8b12569fe100201390ec2e58ec7e64dc31bdc37e6d113103c3622e8ecf391dda9b7adaf568a0ab27707b3edca83b00397de330e8

                                                                    • C:\Users\Admin\AppData\Local\Temp\6L2ySswQ0j.bat

                                                                      Filesize

                                                                      210B

                                                                      MD5

                                                                      4c1d37979085c1e0c84503ffc5e2ff32

                                                                      SHA1

                                                                      d9ae149f223a0391b9fc5f40de04a9933a8ed03c

                                                                      SHA256

                                                                      8f86303da108523dfcbdf6bab8f1b6ad302283e3079176e7600c1dc978676460

                                                                      SHA512

                                                                      b87fc629fe3623a1f74cd5cd6960af9edded840f33d3bf268433f3a8042e4003ad624946cb588f49b9bdbc8a46052dd27375b1196eaacb2f2cbe7d4d911e93ce

                                                                    • C:\Users\Admin\AppData\Local\Temp\BIMUOuvqlP.bat

                                                                      Filesize

                                                                      162B

                                                                      MD5

                                                                      8c6d5b7bd98b8856f5c6c56c3c4fbb9d

                                                                      SHA1

                                                                      080a85d83c22ea767ea4886e06075643da1b4630

                                                                      SHA256

                                                                      318d39db4193a8b7d45bbef21aa4145e7b7839bd52af19f528032799a0a88665

                                                                      SHA512

                                                                      7fe4d40110a34584bf4ca6974f9079afe16d8616fc92f35546730bb168fb9364172dcadc79337d57f4e4cf53d9eff9aaa433735def7d85b9f41961366569f608

                                                                    • C:\Users\Admin\AppData\Local\Temp\Dl1lNRuX9F.bat

                                                                      Filesize

                                                                      210B

                                                                      MD5

                                                                      81d2b01b77e6a1905981b48462125c57

                                                                      SHA1

                                                                      8c7870c339bf3bc6e0d5bc057b4ce6dcc01d1990

                                                                      SHA256

                                                                      e90c50f27b8ee6463ec2595a1110ec30b662cbe41dec4bf3d38d91886087e356

                                                                      SHA512

                                                                      c5a3be7076336613f645f2c97c5f06b3f6ac009346b5f3bdfc6d5a16246b9b50d2db77f2581bf7a283b9d0319e25decc00f0b84c73dec2af5ed95ef86d9ee291

                                                                    • C:\Users\Admin\AppData\Local\Temp\PLxqGDTluw.bat

                                                                      Filesize

                                                                      210B

                                                                      MD5

                                                                      cc2bdf65c3144bcdafd6ce30e55197d9

                                                                      SHA1

                                                                      4f6d40f4432df3b41e23d6b4f50c08df9995676e

                                                                      SHA256

                                                                      51489aa22f0bfad9b6eea07e903ed00d8bb74d3adce9a654c25d1e794f739d2e

                                                                      SHA512

                                                                      4bb344032ca1e6f33f577efe6cde016a5c61f574151729dd99b98a77c9774630286af7bff67b1c7a3e95a1829c239212ef3423242dd0d9b0b255ffec3c424251

                                                                    • C:\Users\Admin\AppData\Local\Temp\RESCDC0.tmp

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      d9af68b7ba58fd29acd54033f5654e76

                                                                      SHA1

                                                                      17c057cfa907d91831e8b3ea082df6e43a1e503e

                                                                      SHA256

                                                                      4d6e21d77978455d6833b879b322c623a4b7dd4811328ba304364d5ce2793bb0

                                                                      SHA512

                                                                      45b53e0fae8c7e4f45aa94e0f5335f4d3687af5b28c4c5fe595d5e73ac11b5e903a289604a409833f768a09bef570f547389f504fb7ee62f04544052017b2182

                                                                    • C:\Users\Admin\AppData\Local\Temp\T3REiUSKTh.bat

                                                                      Filesize

                                                                      162B

                                                                      MD5

                                                                      81acd835d62635713f1f61938a14753b

                                                                      SHA1

                                                                      ac855597688fc2de5d0dcb09cf137f83fabdfe55

                                                                      SHA256

                                                                      3b21f62e3d84af491ba8fa49ec94a99641ce19e778f449041d109ba679ad96d0

                                                                      SHA512

                                                                      4fd7d8a9207008a7f6253bef84b84888370918483e2f791ac3fca331e3b757c1954d8f430f15450284cec9528455f3036967e72966da14e1f9ca3222d5118a44

                                                                    • C:\Users\Admin\AppData\Local\Temp\YlsA6cJawy.bat

                                                                      Filesize

                                                                      210B

                                                                      MD5

                                                                      09087c42fd5bc2e5a9f002443bc83486

                                                                      SHA1

                                                                      0be14b6965ae64ca6ca79c259638ed946f140d8c

                                                                      SHA256

                                                                      92faea04d306cb39fb589b8470033b8e47ffffcde69661f5837e30c6a1e95c2e

                                                                      SHA512

                                                                      8bef06b4b4f42b17234315b0038db1af872500c126a8ce7784c603cc987d644c5f5c82692f0eab3e3b3b7c1951145093dd21a0cdf8edc447c7fec8f2d2bb6889

                                                                    • C:\Users\Admin\AppData\Local\Temp\cTMYZuI8Vj.bat

                                                                      Filesize

                                                                      162B

                                                                      MD5

                                                                      9b23ba2c15639d31e89dee771738dfdc

                                                                      SHA1

                                                                      7a054f07ca3fd6250de1a3bbbff468a6133e25ea

                                                                      SHA256

                                                                      2db4fce07e47b4a46bb996806b55eb94f9ece06d5ee1dbd0a3d3ab041537d86a

                                                                      SHA512

                                                                      2bec863031be09a4ed02471ada1e0905ff2310d166d399e3426336e3d3c8d1681236f70f330210e029dc7acf127e48bfa5ffc0089c6c5d9752338b37b795585c

                                                                    • C:\Users\Admin\AppData\Local\Temp\grDS520PRI.bat

                                                                      Filesize

                                                                      210B

                                                                      MD5

                                                                      9e6a416441784afc8a39390014c432fa

                                                                      SHA1

                                                                      0a11a1f28c6caaba83dd0f7a5af51b015eaf98d5

                                                                      SHA256

                                                                      8e04836948325be102ceaf0974ecde25abf7e94ac5694da2a931b58a930d917d

                                                                      SHA512

                                                                      cf016f85cd6cf94ee4df240542aa4d75b1886899c0437445fa4f9c9c6e73583a81b5cfe4484e9367990e85a011d1017efdae3735d20e48a5c8e91050730e3b80

                                                                    • C:\Users\Admin\AppData\Local\Temp\h53aanzGdD.bat

                                                                      Filesize

                                                                      210B

                                                                      MD5

                                                                      db68a24d9c3cb522c77a4872e6a223cf

                                                                      SHA1

                                                                      663bcab19a16617f1de39e26f5d81d0c445eb0df

                                                                      SHA256

                                                                      7e584a12e43cea4339ce1c11d1282d899ddddf43ce2897cd6ea3c9c2b29e6f10

                                                                      SHA512

                                                                      1854c11ad7aad44fddb7ce0c1f7516e211e34a75e0ba1f5bac5340637c24d1c5e887a270d4e42e9442b7daae150a21dc8fee55a31a1deaa7702a877b3c85af25

                                                                    • C:\Users\Admin\AppData\Local\Temp\kE5LbAifMs.bat

                                                                      Filesize

                                                                      162B

                                                                      MD5

                                                                      6dff1bee5c8bf484f6b94ec0344067ec

                                                                      SHA1

                                                                      b2f7c48dc0d8b9d9fe20d944af61705f7646c518

                                                                      SHA256

                                                                      f0c217d80c3b094a98550464ff595b9d4ce7b09f0d6f409cbcd24ca083e0fc59

                                                                      SHA512

                                                                      972aed1cccc838f840c0bf642c94df480dcc160219bc088e917bfc06f17e372191b99bd9367efd40e8f79dabb9f1c11de7ad42aa2911590d2a5fb1258ec31bcd

                                                                    • C:\Users\Admin\AppData\Local\Temp\qPEz3ygwJT.bat

                                                                      Filesize

                                                                      162B

                                                                      MD5

                                                                      2a8de98924b71ca088d43c1ec25cab25

                                                                      SHA1

                                                                      4d9c1fe1b5a527ef8cd8983a69e204758aca7740

                                                                      SHA256

                                                                      1d4130c9507b2354685c39992dcbd65ca99d96ee4871da3f7637493d3c614d1b

                                                                      SHA512

                                                                      a6d7a1e3c37be168f6baa9f10fa3b9ef125f9f9d1bd9b3e510edccbef5cf446c93c36f340f523164ab1d846c5b247a7241c171fb271fe4418e7ce15cad21ef97

                                                                    • C:\Users\Admin\AppData\Local\Temp\ybJBPcXt9a.bat

                                                                      Filesize

                                                                      210B

                                                                      MD5

                                                                      7e96ae9e05aa89c22395479bb1ad98e0

                                                                      SHA1

                                                                      48068e0c9bff10ac1a7e7ce7ae1ec159f395b6c3

                                                                      SHA256

                                                                      3cf7f08ed5dedebd005a048fa755f80b693e7ef33b17e537ed1843a5bee0ad01

                                                                      SHA512

                                                                      c0dd29c73b456b6b1fa17063f4536ed9274036c6f6e7ade6c492cc5e5ab50e9b03c32bb84951d0e9607a9e41e6b3f11302e9af956fdb18d208e8da736e5e23ff

                                                                    • C:\hyperIntoBroker\7ZVJJhRLWkC.bat

                                                                      Filesize

                                                                      78B

                                                                      MD5

                                                                      65f873c875c73f084119594a4449ecea

                                                                      SHA1

                                                                      9f050c5bfc5cd3d94c37acac16105f031658904f

                                                                      SHA256

                                                                      825a9f47fd1242c15bd81fea64d0f739c9e74f62a1820e182cfa069e1726fd90

                                                                      SHA512

                                                                      c4c2886fd99303e222a379a02c981532070c932acb70d2a7460fe257e22b8b0625018fab158e7be011bd5b2f7c45517e2c2fc947b11b84bbbda37ecc1bdc8d63

                                                                    • C:\hyperIntoBroker\hyperProviderbrokermonitorNet.exe

                                                                      Filesize

                                                                      1.9MB

                                                                      MD5

                                                                      54eff01605da5e7cbdb382c98ece2c2a

                                                                      SHA1

                                                                      be2ecfc24603a5e282bdfbb7780a03c1410879b8

                                                                      SHA256

                                                                      26bda6e083db3a3c3ccaf29434850d91bbb9e10c48886a6f6a06bbf6c183448d

                                                                      SHA512

                                                                      dd00705fb9741c6400145e2433af42605264a95e4c1fe44ee1579ac464463f9b493d8bdef98af4a5b03d717cd79357674cc09e5b8780c4ffe31a9704b08c89d0

                                                                    • C:\hyperIntoBroker\vN1MMUTrCtC1FtSWQe4vLUvQugg9bTGuni3V.vbe

                                                                      Filesize

                                                                      205B

                                                                      MD5

                                                                      3abc77a7e4977f35cab6e9f29e677438

                                                                      SHA1

                                                                      bd300a11ea5af663fe723883f8b5d980d1cbb417

                                                                      SHA256

                                                                      e987a0608105af1e7422322184159c1559b26e3d84c27917408c2cdbbd9f9a72

                                                                      SHA512

                                                                      b445fd9b854e822077d17b060edd7e253b8e8aeb8ebfb4e1084e2d604276295d715101f0ce1e1b25f0d83247385f76b1ab8885efd7ba6286cd8317d994359cb1

                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\lhgaili1\lhgaili1.0.cs

                                                                      Filesize

                                                                      388B

                                                                      MD5

                                                                      c4c686376ed80e41f7f7357fad926749

                                                                      SHA1

                                                                      1658cb22bae9f277a63a85d6bf5156ac0762b3e4

                                                                      SHA256

                                                                      d068bd3737efe42200b5d4ac050b7cacc1c2fc44876edf8e63c0e80a5ce50bfc

                                                                      SHA512

                                                                      d20e0258dcee8ec0451f231f1648dd510f8b2becb44d3254e86be05d493da697605e3279e42cd4892fd01cf0c7b03da3da48d7f1d21c6bc769aee3e492258b16

                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\lhgaili1\lhgaili1.cmdline

                                                                      Filesize

                                                                      235B

                                                                      MD5

                                                                      87a2deae230fd5034d6eacd8d7f4c67e

                                                                      SHA1

                                                                      7f49e1dfcb17e280de52b33f77801716dc528db1

                                                                      SHA256

                                                                      74a9fe70fc62b30fb5e9edcc26896f763994e30eca8251fad994c2949f7f3ff1

                                                                      SHA512

                                                                      530786407ded952e97b630949384c19effdc40bfa0755e9ed2cf89b48be0bbffec23bb8f91dc7a0a8ecd7362feae37a47a6b798e10616eb08c20501027c50080

                                                                    • \??\c:\Windows\System32\CSC1EDDCB862694B989EA675C75E9DC57D.TMP

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      634e281a00b7b9f516c3048badfa1530

                                                                      SHA1

                                                                      af6369715ce2fe9b99609e470d4f66698880a35a

                                                                      SHA256

                                                                      0d990336ae793f3f6903048004c8d707d7a7191927bd7df46b7fe887116506c8

                                                                      SHA512

                                                                      1cb35fa0759f5362c9c7eee5546710874121005a3924bcfec2cf33ac90a257a807ce7ec0db7bc84dcb327604d708009449c34f52560ed936b54eeba49be7d27b

                                                                    • memory/184-243-0x000000001B6B0000-0x000000001B759000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/220-103-0x000000001BD80000-0x000000001BE29000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/380-187-0x000000001B500000-0x000000001B5A9000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/1056-201-0x000000001C1D0000-0x000000001C279000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/1056-117-0x000000001C3F0000-0x000000001C499000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/2584-159-0x000000001C3B0000-0x000000001C459000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/2632-131-0x000000001CCC0000-0x000000001CD69000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/2884-74-0x000000001B930000-0x000000001B9D9000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/3160-26-0x000000001B140000-0x000000001B14E000-memory.dmp

                                                                      Filesize

                                                                      56KB

                                                                    • memory/3160-18-0x000000001B4C0000-0x000000001B510000-memory.dmp

                                                                      Filesize

                                                                      320KB

                                                                    • memory/3160-12-0x00007FFB09DD3000-0x00007FFB09DD5000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/3160-57-0x000000001B610000-0x000000001B6B9000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/3160-13-0x00000000001D0000-0x00000000003C4000-memory.dmp

                                                                      Filesize

                                                                      2.0MB

                                                                    • memory/3160-28-0x000000001B150000-0x000000001B15C000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/3160-24-0x000000001B0F0000-0x000000001B0FC000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/3160-22-0x000000001B0E0000-0x000000001B0EC000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/3160-20-0x000000001B120000-0x000000001B138000-memory.dmp

                                                                      Filesize

                                                                      96KB

                                                                    • memory/3160-15-0x00000000025B0000-0x00000000025BE000-memory.dmp

                                                                      Filesize

                                                                      56KB

                                                                    • memory/3160-17-0x000000001B100000-0x000000001B11C000-memory.dmp

                                                                      Filesize

                                                                      112KB

                                                                    • memory/3504-145-0x000000001B190000-0x000000001B239000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/3640-215-0x000000001BEF0000-0x000000001BF99000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/4080-229-0x000000001B7E0000-0x000000001B889000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/4604-173-0x000000001CC20000-0x000000001CCC9000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/4804-89-0x000000001BF30000-0x000000001BFD9000-memory.dmp

                                                                      Filesize

                                                                      676KB

                                                                    • memory/4928-257-0x000000001C260000-0x000000001C309000-memory.dmp

                                                                      Filesize

                                                                      676KB