Analysis
-
max time kernel
65s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 11:41
Behavioral task
behavioral1
Sample
BAE83C597A9F76E1A42B833F108C8C9A.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
BAE83C597A9F76E1A42B833F108C8C9A.exe
Resource
win10v2004-20241007-en
General
-
Target
BAE83C597A9F76E1A42B833F108C8C9A.exe
-
Size
1.1MB
-
MD5
bae83c597a9f76e1a42b833f108c8c9a
-
SHA1
c0be6ab84266d366d22b28c5bc0d68f2be525fc1
-
SHA256
46f77240e4a469bf38e0600e95edf6de249ede13f5a41de3702af584a69b7761
-
SHA512
0b72794bc1d6ce47406a7fc4a12b1a0107633882cb06387f6abe9ef6480a93381bed71ac254e8bfdfa434b65f04419136e4ff992346f420f289075c48484715e
-
SSDEEP
24576:K2G/nvxW3WHKfhIVMjZs1LtHoFJS32TpfXVH:KbA3xZ0Mj6g3
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3056 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2728 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 568 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2296 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1788 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1680 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1208 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1984 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 320 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2516 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2260 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2416 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1808 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1008 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 676 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1056 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1100 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1968 2876 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1548 2876 schtasks.exe 33 -
resource yara_rule behavioral1/files/0x0008000000016d0c-9.dat dcrat behavioral1/memory/2904-13-0x0000000001130000-0x0000000001206000-memory.dmp dcrat behavioral1/memory/1180-45-0x0000000000200000-0x00000000002D6000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2904 blockweb.exe 1180 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1372 cmd.exe 1372 cmd.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\ja-JP\csrss.exe blockweb.exe File created C:\Program Files\Windows Sidebar\ja-JP\886983d96e3d3e blockweb.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\wininit.exe blockweb.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\56085415360792 blockweb.exe File created C:\Program Files (x86)\Windows Portable Devices\smss.exe blockweb.exe File created C:\Program Files (x86)\Windows Portable Devices\69ddcba757bf72 blockweb.exe File created C:\Program Files\Windows Sidebar\es-ES\taskhost.exe blockweb.exe File created C:\Program Files\Windows Sidebar\es-ES\b75386f1303e64 blockweb.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\system\lsm.exe blockweb.exe File opened for modification C:\Windows\system\lsm.exe blockweb.exe File created C:\Windows\system\101b941d020240 blockweb.exe File created C:\Windows\security\logs\cmd.exe blockweb.exe File created C:\Windows\security\logs\ebf1f9fa8afd6d blockweb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BAE83C597A9F76E1A42B833F108C8C9A.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1028 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe 2672 schtasks.exe 1492 schtasks.exe 2516 schtasks.exe 676 schtasks.exe 1056 schtasks.exe 1548 schtasks.exe 2828 schtasks.exe 2700 schtasks.exe 1788 schtasks.exe 1740 schtasks.exe 2336 schtasks.exe 1100 schtasks.exe 2872 schtasks.exe 1808 schtasks.exe 1008 schtasks.exe 1968 schtasks.exe 2868 schtasks.exe 2604 schtasks.exe 2988 schtasks.exe 1984 schtasks.exe 2984 schtasks.exe 1628 schtasks.exe 2192 schtasks.exe 2736 schtasks.exe 2296 schtasks.exe 2120 schtasks.exe 1208 schtasks.exe 320 schtasks.exe 2260 schtasks.exe 3056 schtasks.exe 1988 schtasks.exe 568 schtasks.exe 908 schtasks.exe 1680 schtasks.exe 2416 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2904 blockweb.exe 2904 blockweb.exe 2904 blockweb.exe 1180 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2904 blockweb.exe Token: SeDebugPrivilege 1180 cmd.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2532 2104 BAE83C597A9F76E1A42B833F108C8C9A.exe 29 PID 2104 wrote to memory of 2532 2104 BAE83C597A9F76E1A42B833F108C8C9A.exe 29 PID 2104 wrote to memory of 2532 2104 BAE83C597A9F76E1A42B833F108C8C9A.exe 29 PID 2104 wrote to memory of 2532 2104 BAE83C597A9F76E1A42B833F108C8C9A.exe 29 PID 2532 wrote to memory of 1372 2532 WScript.exe 30 PID 2532 wrote to memory of 1372 2532 WScript.exe 30 PID 2532 wrote to memory of 1372 2532 WScript.exe 30 PID 2532 wrote to memory of 1372 2532 WScript.exe 30 PID 1372 wrote to memory of 2904 1372 cmd.exe 32 PID 1372 wrote to memory of 2904 1372 cmd.exe 32 PID 1372 wrote to memory of 2904 1372 cmd.exe 32 PID 1372 wrote to memory of 2904 1372 cmd.exe 32 PID 2904 wrote to memory of 1768 2904 blockweb.exe 70 PID 2904 wrote to memory of 1768 2904 blockweb.exe 70 PID 2904 wrote to memory of 1768 2904 blockweb.exe 70 PID 1372 wrote to memory of 1028 1372 cmd.exe 72 PID 1372 wrote to memory of 1028 1372 cmd.exe 72 PID 1372 wrote to memory of 1028 1372 cmd.exe 72 PID 1372 wrote to memory of 1028 1372 cmd.exe 72 PID 1768 wrote to memory of 1700 1768 cmd.exe 73 PID 1768 wrote to memory of 1700 1768 cmd.exe 73 PID 1768 wrote to memory of 1700 1768 cmd.exe 73 PID 1768 wrote to memory of 1180 1768 cmd.exe 74 PID 1768 wrote to memory of 1180 1768 cmd.exe 74 PID 1768 wrote to memory of 1180 1768 cmd.exe 74 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BAE83C597A9F76E1A42B833F108C8C9A.exe"C:\Users\Admin\AppData\Local\Temp\BAE83C597A9F76E1A42B833F108C8C9A.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ServerBrokerperf\PsCiFwPs5yLlLF7yRNDHfRA.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ServerBrokerperf\yZmK36IDpKQLRFj1psdgPwkClrgJN.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\ServerBrokerperf\blockweb.exe"C:\ServerBrokerperf\blockweb.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lLKmmsYT5g.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1700
-
-
C:\Windows\security\logs\cmd.exe"C:\Windows\security\logs\cmd.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1028
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Windows\system\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\system\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Windows\system\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Sidebar\es-ES\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\es-ES\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\es-ES\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Sidebar\ja-JP\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Sidebar\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Adobe\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Adobe\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Windows\Temp\Crashpad\reports\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\Temp\Crashpad\reports\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Windows\Temp\Crashpad\reports\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Saved Games\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default\Saved Games\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Saved Games\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "blockwebb" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\blockweb.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "blockweb" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\blockweb.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "blockwebb" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\blockweb.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Links\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Admin\Links\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Links\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\Windows\security\logs\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\security\logs\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Windows\security\logs\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Portable Devices\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Portable Devices\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222B
MD5e0e59f3a0ad8f6fc6107daf9f5ea2298
SHA13d8c5af544fb8e00a9aef7ceb6e861d34842aa67
SHA2567be9d4ddae790ad15f1fa1ec2f42c22becbf3c53b3f88e77f87dc2d7e86e2370
SHA51221aab8c94d0c6c473c472eeb779810fcf7520fb6249bc6db6945fdf1d03fabc00f9889d744f9b8593cdb1c44a62c69f738d1a13a55ef2bd3b33a7ffeed333639
-
Filesize
146B
MD573f4bc9864b7eb9026937170a277b68e
SHA1afec9c4c687c356a4114e282e7f188454911fbe5
SHA25665d9d5d04a37d38026be224b5b6e70941e58d62acd86d177408f7dd041e11ad4
SHA512b63b0700313f581ef56789a811023c9b7ad63aa52d16a8322cd53c82792208b9fb4caf5f3d9118542d96c18ef47cc6aab56f84c99c62e40c1309c48b81110b03
-
Filesize
197B
MD54d9fd0de2881abfcbc1e71b4486c26f3
SHA18f4763dcc2ba62e0b7450596387cdd280655560a
SHA256132a4f03a9219ae2f37009b73ddbbdc830bbaf9274864bf647d4253bdaa1cea5
SHA51260ae90c7e69cbf19734fd2daf9977dc51600d405f60b8ebf52254856f32181743387201d863b10db317e4e4e65be188a252a780db5b5ce2fb4ba07bc3bcede62
-
Filesize
827KB
MD57405cb828a4d484032c1507b1780f464
SHA1dfd41854c4ac381431516ec27d12a1535acabb3a
SHA25653404151c9e675018976662123f67680a45b91dd533788501ba2777d0cc932ba
SHA5121439c2204c7aea94514b5d7be5c0d9a7cc2aefc6904eceabb7c616466fd99cc79af0e99a21ca4180da2025dbc2ec8edf682e687d3074db9609d284eb965c39a3