Analysis

  • max time kernel
    144s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2025 02:21

General

  • Target

    5a47bbdd5a87677ce485cfa5eae97ce572dae896ec0fb306f8b4a2ad8d5f856c.exe

  • Size

    2.4MB

  • MD5

    b34673a6ae78f3a63160d7f87c92a6d4

  • SHA1

    3e28a8ac30adf1ef1409d58d0b6949bb500b1a09

  • SHA256

    5a47bbdd5a87677ce485cfa5eae97ce572dae896ec0fb306f8b4a2ad8d5f856c

  • SHA512

    5e2d5a4b0bc3225e4bf2d4985a26d23fa435d3044888ffbf93d64fc78838e73d3093a9b285da5b6fa922a9f1f8d707ee658e8dad3c75655b952b8b328d118be4

  • SSDEEP

    49152:ccI39HRdZ+t1/31gbeRexLxkbtPSPGNGzeV5hp4XFUb9n:cjHRu12LxksPGN8eV53AFM

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 30 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 33 IoCs
  • DCRat payload 9 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 10 IoCs
  • Checks whether UAC is enabled 1 TTPs 22 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 30 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 33 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a47bbdd5a87677ce485cfa5eae97ce572dae896ec0fb306f8b4a2ad8d5f856c.exe
    "C:\Users\Admin\AppData\Local\Temp\5a47bbdd5a87677ce485cfa5eae97ce572dae896ec0fb306f8b4a2ad8d5f856c.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2388
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tvtFfkCyAX.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1076
        • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe
          "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2128
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sPXGbYzrvf.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:568
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              5⤵
                PID:1560
              • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe
                "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe"
                5⤵
                • UAC bypass
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:2292
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WM6x9zCNT5.bat"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1356
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    7⤵
                      PID:2932
                    • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe
                      "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe"
                      7⤵
                      • UAC bypass
                      • Executes dropped EXE
                      • Checks whether UAC is enabled
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      • System policy modification
                      PID:2836
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CxpWyGgMb4.bat"
                        8⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2224
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          9⤵
                            PID:2064
                          • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe
                            "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe"
                            9⤵
                            • UAC bypass
                            • Executes dropped EXE
                            • Checks whether UAC is enabled
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            • System policy modification
                            PID:2968
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Jk1vLt9ke4.bat"
                              10⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2096
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                11⤵
                                  PID:2056
                                • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe
                                  "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe"
                                  11⤵
                                  • UAC bypass
                                  • Executes dropped EXE
                                  • Checks whether UAC is enabled
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  • System policy modification
                                  PID:2216
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zcjutnjrcv.bat"
                                    12⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:1144
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      13⤵
                                        PID:976
                                      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe
                                        "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe"
                                        13⤵
                                        • UAC bypass
                                        • Executes dropped EXE
                                        • Checks whether UAC is enabled
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        • System policy modification
                                        PID:2232
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\eUivgxqvfs.bat"
                                          14⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:660
                                          • C:\Windows\system32\w32tm.exe
                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                            15⤵
                                              PID:2284
                                            • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe
                                              "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe"
                                              15⤵
                                              • UAC bypass
                                              • Executes dropped EXE
                                              • Checks whether UAC is enabled
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of WriteProcessMemory
                                              • System policy modification
                                              PID:1572
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Jlvf1Vq2YP.bat"
                                                16⤵
                                                  PID:572
                                                  • C:\Windows\system32\w32tm.exe
                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                    17⤵
                                                      PID:1780
                                                    • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe
                                                      "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe"
                                                      17⤵
                                                      • UAC bypass
                                                      • Executes dropped EXE
                                                      • Checks whether UAC is enabled
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • System policy modification
                                                      PID:932
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Q0tVgmHuxR.bat"
                                                        18⤵
                                                          PID:2916
                                                          • C:\Windows\system32\w32tm.exe
                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                            19⤵
                                                              PID:2816
                                                            • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe
                                                              "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe"
                                                              19⤵
                                                              • UAC bypass
                                                              • Executes dropped EXE
                                                              • Checks whether UAC is enabled
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • System policy modification
                                                              PID:2028
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HHf3c4kdaf.bat"
                                                                20⤵
                                                                  PID:2064
                                                                  • C:\Windows\system32\w32tm.exe
                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                    21⤵
                                                                      PID:1840
                                                                    • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe
                                                                      "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe"
                                                                      21⤵
                                                                      • UAC bypass
                                                                      • Executes dropped EXE
                                                                      • Checks whether UAC is enabled
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • System policy modification
                                                                      PID:2812
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\System.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1720
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2976
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2880
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows NT\lsass.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2724
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\lsass.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2784
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\lsass.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2588
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsm.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2600
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2812
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsml" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1064
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Uninstall Information\WmiPrvSE.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2508
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Uninstall Information\WmiPrvSE.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2396
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Uninstall Information\WmiPrvSE.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1916
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Adobe\WmiPrvSE.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:580
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\WmiPrvSE.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2800
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Adobe\WmiPrvSE.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:3052
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Favorites\OSPPSVC.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1144
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\Default\Favorites\OSPPSVC.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2972
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Favorites\OSPPSVC.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1260
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\explorer.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1312
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\explorer.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2896
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\explorer.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2328
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\taskhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1804
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\taskhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1536
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\taskhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2424
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\it-IT\lsm.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2908
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\it-IT\lsm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1160
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\it-IT\lsm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2088
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2684
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2080
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1220

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Program Files (x86)\Adobe\WmiPrvSE.exe

                              Filesize

                              2.4MB

                              MD5

                              b34673a6ae78f3a63160d7f87c92a6d4

                              SHA1

                              3e28a8ac30adf1ef1409d58d0b6949bb500b1a09

                              SHA256

                              5a47bbdd5a87677ce485cfa5eae97ce572dae896ec0fb306f8b4a2ad8d5f856c

                              SHA512

                              5e2d5a4b0bc3225e4bf2d4985a26d23fa435d3044888ffbf93d64fc78838e73d3093a9b285da5b6fa922a9f1f8d707ee658e8dad3c75655b952b8b328d118be4

                            • C:\Users\Admin\AppData\Local\Temp\CxpWyGgMb4.bat

                              Filesize

                              237B

                              MD5

                              c9b7998ad6fba762b3a1e5f5a348effd

                              SHA1

                              5f853a5f5b4db590a77bef72cd0a6a8ebb582ad0

                              SHA256

                              689a398f95538ec67253418e47c7f0ea1fec19b3c262f32cd28da618f2c6e78f

                              SHA512

                              0f0570bad2ad5130a834de9c4bfc69285ca4f8d4dba5e9d364528b70f981213caade4cfcf20ad6738cb1d880e01ad1f88fc1c26701623f698d0653b1a9d98429

                            • C:\Users\Admin\AppData\Local\Temp\HHf3c4kdaf.bat

                              Filesize

                              237B

                              MD5

                              4192340a9e979fbbdfcf6997945b0931

                              SHA1

                              5ee8a6ffd15ea03bbea0b4c3407790810d9bf924

                              SHA256

                              79f5880d8c8eac8f73869e0fde1f4b7e04b5bcb9e22839b5c5a78a377262a723

                              SHA512

                              26b9c4b6f06a534341d69d726c69f3417adf5a968f7633daf21da2b29aa4e18231d6be83ff6e4375bbc8606ce5eb023041bc913d9f141af5e9dbd04cbc1ad771

                            • C:\Users\Admin\AppData\Local\Temp\Jk1vLt9ke4.bat

                              Filesize

                              237B

                              MD5

                              7a2d45714d5f7f8fedebdea290a6be36

                              SHA1

                              09a4147a37a4127ae98afdf440ef09a4d11ef4a7

                              SHA256

                              7409df149192d4c6329e0fcfd5dab1ce19ee72a2c4fccd58bbad283b1ccf7a82

                              SHA512

                              c4901cd8db3edf474d35e378c0c276abe093a605a9978f15247ef0b90e6b155f346bee8d65db1aec777029889602e4962d88ecd97e694f4af05085eb43780685

                            • C:\Users\Admin\AppData\Local\Temp\Jlvf1Vq2YP.bat

                              Filesize

                              237B

                              MD5

                              d2e6dbae020d242b4e36b6a31f6d8050

                              SHA1

                              c74df6b60135e0beaad945f529bb6732753f9785

                              SHA256

                              12f7ea57004ae522c9a8202f075f396198097a06b3b7ab5a33bfed6a481d3ce1

                              SHA512

                              495d9760017264b96a22f47a57160ef27959a7decf499e76ab3c5321a7d0131a593580be45e9d0d6bb552b695b6dc5cc1f92ea8af548db14b6b105f4808765c6

                            • C:\Users\Admin\AppData\Local\Temp\Q0tVgmHuxR.bat

                              Filesize

                              237B

                              MD5

                              3e194855e835e7f95a965b1c081d1ef4

                              SHA1

                              0ba03c95149d7687bfaf41716c069b34159af348

                              SHA256

                              d679ae954ad0b23f90ace76a3c1ad3635da8011fbefd6cd4784daad31a84fb48

                              SHA512

                              d64cc5d4f9059c8e94851b4c92e0cafcf61d143d7ac4e2060a8d7dfa719e9bd61ec2374d52f77e45ef5ef867c1645a037dee1f4210868c61549a52e8f8c3ec1a

                            • C:\Users\Admin\AppData\Local\Temp\WM6x9zCNT5.bat

                              Filesize

                              237B

                              MD5

                              0646fe99241be75ff770388cba2eafb4

                              SHA1

                              4b88d1932f286afa5529d33e083a7ff124275349

                              SHA256

                              6854f3071ff0a078d79562770f72aa87116d2dc2c5a8576ab3ac6778945a0efe

                              SHA512

                              109dd9a2521780f46773aca8c43f5fbd976e5a513988d21099c7639c6a5dbfd0205eb4fc7196188ea795bf5987ac249114870361cb123ea7311853babd279abf

                            • C:\Users\Admin\AppData\Local\Temp\eUivgxqvfs.bat

                              Filesize

                              237B

                              MD5

                              3ea79b0ac8df133b5ee29cbe914fd1cf

                              SHA1

                              8e681aaa03e902db70f993eef7ab8e43879b2292

                              SHA256

                              c03e95d989a9e2e40b29f6d68978101ce4413e1bddda17606f9c253dae8238cb

                              SHA512

                              e23c348184dddd5c8b902034abfe00d0b882d2fca899df7478e06aed604c429b466f3b42fce28a2a302b629908c6c109f6a67e3047e705734264bb2d75efa74c

                            • C:\Users\Admin\AppData\Local\Temp\sPXGbYzrvf.bat

                              Filesize

                              237B

                              MD5

                              c9e9af42ba6349d89fe3c06ccbf8b28e

                              SHA1

                              483bccdd439c53b4c4390e20f8544b48ac946a8d

                              SHA256

                              51b3d7aa137bbbda37afee3db7940ea2773eff81d2d6abfade650ed51ee03200

                              SHA512

                              a0cfb595de562ee72178330428d66051eee71002e3e79cc8d3b6d6c7e02bb186336dab998e593666639b5471dd557947ff662b6a11334498d7e3dedd3e4f4dd7

                            • C:\Users\Admin\AppData\Local\Temp\tvtFfkCyAX.bat

                              Filesize

                              237B

                              MD5

                              a43e102fbbddef5c1817dc9e1d5ceee8

                              SHA1

                              2162aafa75ef79838baaf0bd58f9e5853cc58e6e

                              SHA256

                              345be72f73f12d4ef3e3e838d5599c893676280293422ac65e929d99302d2434

                              SHA512

                              3fdc67c6ec704e11a6e24e194dbbe78d49397103ffdebf7a60b2b670906494bc42d1e1e7b6ec6ef21095be4744d9bbfe24338ab9880f1c68529a61231cf9ac26

                            • C:\Users\Admin\AppData\Local\Temp\zcjutnjrcv.bat

                              Filesize

                              237B

                              MD5

                              0a16011b325e8f895ce6e0f7137ce0d0

                              SHA1

                              ecb59277676db1de6885f03015fef3e83ffa5d2d

                              SHA256

                              bbd5bb68cc6a049e4bc25db573fc4bb9cd003569577b14b0016b557e8d64b0c6

                              SHA512

                              9c880b9f159a055bc4a0b2df01934c7c7ad01fef2f30f047b654bfd5c3b905b1f5c5d4bc4ebbc982fe447932e263f6859bee5d569c7a06509d6492418e8c74bb

                            • memory/1572-93-0x0000000000E00000-0x0000000000E56000-memory.dmp

                              Filesize

                              344KB

                            • memory/2028-106-0x0000000000160000-0x00000000003C2000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2128-47-0x0000000002150000-0x00000000021A6000-memory.dmp

                              Filesize

                              344KB

                            • memory/2128-46-0x00000000007F0000-0x0000000000802000-memory.dmp

                              Filesize

                              72KB

                            • memory/2128-45-0x0000000000850000-0x0000000000AB2000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2216-78-0x00000000003E0000-0x00000000003F2000-memory.dmp

                              Filesize

                              72KB

                            • memory/2216-79-0x0000000000B40000-0x0000000000B52000-memory.dmp

                              Filesize

                              72KB

                            • memory/2216-77-0x00000000012F0000-0x0000000001552000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2232-86-0x0000000000460000-0x0000000000472000-memory.dmp

                              Filesize

                              72KB

                            • memory/2292-54-0x0000000000280000-0x00000000004E2000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2292-55-0x0000000000150000-0x0000000000162000-memory.dmp

                              Filesize

                              72KB

                            • memory/2388-8-0x0000000000480000-0x000000000048C000-memory.dmp

                              Filesize

                              48KB

                            • memory/2388-5-0x0000000000610000-0x000000000061C000-memory.dmp

                              Filesize

                              48KB

                            • memory/2388-12-0x00000000009D0000-0x00000000009E2000-memory.dmp

                              Filesize

                              72KB

                            • memory/2388-13-0x0000000002280000-0x000000000228C000-memory.dmp

                              Filesize

                              48KB

                            • memory/2388-10-0x00000000009B0000-0x00000000009BC000-memory.dmp

                              Filesize

                              48KB

                            • memory/2388-1-0x0000000000A00000-0x0000000000C62000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2388-2-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2388-9-0x00000000009A0000-0x00000000009A8000-memory.dmp

                              Filesize

                              32KB

                            • memory/2388-3-0x00000000003C0000-0x00000000003C8000-memory.dmp

                              Filesize

                              32KB

                            • memory/2388-16-0x00000000022B0000-0x00000000022BE000-memory.dmp

                              Filesize

                              56KB

                            • memory/2388-14-0x0000000002290000-0x0000000002298000-memory.dmp

                              Filesize

                              32KB

                            • memory/2388-0-0x000007FEF5E03000-0x000007FEF5E04000-memory.dmp

                              Filesize

                              4KB

                            • memory/2388-42-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2388-7-0x0000000000620000-0x0000000000676000-memory.dmp

                              Filesize

                              344KB

                            • memory/2388-15-0x00000000022A0000-0x00000000022AC000-memory.dmp

                              Filesize

                              48KB

                            • memory/2388-6-0x0000000000470000-0x000000000047A000-memory.dmp

                              Filesize

                              40KB

                            • memory/2388-11-0x00000000009C0000-0x00000000009C8000-memory.dmp

                              Filesize

                              32KB

                            • memory/2388-4-0x00000000003D0000-0x00000000003E2000-memory.dmp

                              Filesize

                              72KB

                            • memory/2812-113-0x00000000010F0000-0x0000000001352000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2812-114-0x0000000000350000-0x0000000000362000-memory.dmp

                              Filesize

                              72KB

                            • memory/2812-115-0x0000000000D50000-0x0000000000D62000-memory.dmp

                              Filesize

                              72KB

                            • memory/2836-63-0x00000000002D0000-0x00000000002E2000-memory.dmp

                              Filesize

                              72KB

                            • memory/2836-62-0x00000000011C0000-0x0000000001422000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2968-70-0x0000000000320000-0x0000000000582000-memory.dmp

                              Filesize

                              2.4MB