Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 12:15
Static task
static1
Behavioral task
behavioral1
Sample
NursultanAlphaCrack.bat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NursultanAlphaCrack.bat.exe
Resource
win10v2004-20241007-en
General
-
Target
NursultanAlphaCrack.bat.exe
-
Size
2.7MB
-
MD5
df15d1f8f7cc71bb1889895b367c7d2c
-
SHA1
4a9d087d105976a1f7a1c7444a25b5e0a8ac0622
-
SHA256
09bdb3282e1927dcb848126823280b066827c5dadd17ee6d445922440889d8f2
-
SHA512
3c5215abd2ca1cee15ae3592eea15cebec2ce0127221c96634ad07ea53cf9fa397bfecd229a56b38c879f2fe6dadfc8bd58ac6541bcfc6eba65017d4b3694e4f
-
SSDEEP
49152:IBJVZP6vgp9kHCayPPLHCLXbX4pKXDys7yqmHji4Rnh:y7oYp9kiHPbCfX4rsu3GQh
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2660 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3776 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3288 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3164 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4816 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4160 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1052 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4836 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5028 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4964 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4872 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1768 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3464 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1524 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 748 4320 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1136 4320 schtasks.exe 88 -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4580 powershell.exe 4792 powershell.exe 1668 powershell.exe 2980 powershell.exe 4204 powershell.exe 2328 powershell.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation BlockcontainerWin.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation NursultanAlphaCrack.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation spoolsv.exe -
Executes dropped EXE 14 IoCs
pid Process 2176 BlockcontainerWin.exe 3092 spoolsv.exe 3984 spoolsv.exe 3272 spoolsv.exe 3788 spoolsv.exe 5056 spoolsv.exe 1256 spoolsv.exe 5092 spoolsv.exe 456 spoolsv.exe 1744 spoolsv.exe 3396 spoolsv.exe 2348 spoolsv.exe 1668 spoolsv.exe 2788 spoolsv.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\csrss.exe BlockcontainerWin.exe File created C:\Program Files (x86)\Windows Sidebar\886983d96e3d3e BlockcontainerWin.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\smss.exe BlockcontainerWin.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\69ddcba757bf72 BlockcontainerWin.exe File created C:\Program Files\Windows Security\spoolsv.exe BlockcontainerWin.exe File created C:\Program Files\Windows Security\f3b6ecef712a24 BlockcontainerWin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NursultanAlphaCrack.bat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 10 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4012 PING.EXE 1352 PING.EXE 2004 PING.EXE 2176 PING.EXE 4880 PING.EXE 1964 PING.EXE 2924 PING.EXE 2788 PING.EXE 2408 PING.EXE 1772 PING.EXE -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings NursultanAlphaCrack.bat.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings BlockcontainerWin.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings spoolsv.exe -
Runs ping.exe 1 TTPs 10 IoCs
pid Process 2924 PING.EXE 2176 PING.EXE 1964 PING.EXE 2408 PING.EXE 1772 PING.EXE 4012 PING.EXE 1352 PING.EXE 2004 PING.EXE 4880 PING.EXE 2788 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3776 schtasks.exe 4872 schtasks.exe 1524 schtasks.exe 748 schtasks.exe 2660 schtasks.exe 3164 schtasks.exe 2700 schtasks.exe 2064 schtasks.exe 4836 schtasks.exe 5028 schtasks.exe 3288 schtasks.exe 4160 schtasks.exe 1052 schtasks.exe 1768 schtasks.exe 4816 schtasks.exe 4964 schtasks.exe 3464 schtasks.exe 1136 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe 2176 BlockcontainerWin.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 2176 BlockcontainerWin.exe Token: SeDebugPrivilege 1668 powershell.exe Token: SeDebugPrivilege 4204 powershell.exe Token: SeDebugPrivilege 2328 powershell.exe Token: SeDebugPrivilege 4792 powershell.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeDebugPrivilege 4580 powershell.exe Token: SeDebugPrivilege 3092 spoolsv.exe Token: SeDebugPrivilege 3984 spoolsv.exe Token: SeDebugPrivilege 3272 spoolsv.exe Token: SeDebugPrivilege 3788 spoolsv.exe Token: SeDebugPrivilege 5056 spoolsv.exe Token: SeDebugPrivilege 1256 spoolsv.exe Token: SeDebugPrivilege 5092 spoolsv.exe Token: SeDebugPrivilege 456 spoolsv.exe Token: SeDebugPrivilege 1744 spoolsv.exe Token: SeDebugPrivilege 3396 spoolsv.exe Token: SeDebugPrivilege 2348 spoolsv.exe Token: SeDebugPrivilege 1668 spoolsv.exe Token: SeDebugPrivilege 2788 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3556 wrote to memory of 4656 3556 NursultanAlphaCrack.bat.exe 83 PID 3556 wrote to memory of 4656 3556 NursultanAlphaCrack.bat.exe 83 PID 3556 wrote to memory of 4656 3556 NursultanAlphaCrack.bat.exe 83 PID 4656 wrote to memory of 4468 4656 WScript.exe 85 PID 4656 wrote to memory of 4468 4656 WScript.exe 85 PID 4656 wrote to memory of 4468 4656 WScript.exe 85 PID 4468 wrote to memory of 2176 4468 cmd.exe 87 PID 4468 wrote to memory of 2176 4468 cmd.exe 87 PID 2176 wrote to memory of 4580 2176 BlockcontainerWin.exe 108 PID 2176 wrote to memory of 4580 2176 BlockcontainerWin.exe 108 PID 2176 wrote to memory of 1668 2176 BlockcontainerWin.exe 109 PID 2176 wrote to memory of 1668 2176 BlockcontainerWin.exe 109 PID 2176 wrote to memory of 4792 2176 BlockcontainerWin.exe 110 PID 2176 wrote to memory of 4792 2176 BlockcontainerWin.exe 110 PID 2176 wrote to memory of 2980 2176 BlockcontainerWin.exe 111 PID 2176 wrote to memory of 2980 2176 BlockcontainerWin.exe 111 PID 2176 wrote to memory of 4204 2176 BlockcontainerWin.exe 112 PID 2176 wrote to memory of 4204 2176 BlockcontainerWin.exe 112 PID 2176 wrote to memory of 2328 2176 BlockcontainerWin.exe 113 PID 2176 wrote to memory of 2328 2176 BlockcontainerWin.exe 113 PID 2176 wrote to memory of 2688 2176 BlockcontainerWin.exe 119 PID 2176 wrote to memory of 2688 2176 BlockcontainerWin.exe 119 PID 2688 wrote to memory of 812 2688 cmd.exe 122 PID 2688 wrote to memory of 812 2688 cmd.exe 122 PID 2688 wrote to memory of 2924 2688 cmd.exe 123 PID 2688 wrote to memory of 2924 2688 cmd.exe 123 PID 2688 wrote to memory of 3092 2688 cmd.exe 131 PID 2688 wrote to memory of 3092 2688 cmd.exe 131 PID 3092 wrote to memory of 4120 3092 spoolsv.exe 133 PID 3092 wrote to memory of 4120 3092 spoolsv.exe 133 PID 4120 wrote to memory of 3192 4120 cmd.exe 136 PID 4120 wrote to memory of 3192 4120 cmd.exe 136 PID 4120 wrote to memory of 4012 4120 cmd.exe 137 PID 4120 wrote to memory of 4012 4120 cmd.exe 137 PID 4120 wrote to memory of 3984 4120 cmd.exe 146 PID 4120 wrote to memory of 3984 4120 cmd.exe 146 PID 3984 wrote to memory of 116 3984 spoolsv.exe 148 PID 3984 wrote to memory of 116 3984 spoolsv.exe 148 PID 116 wrote to memory of 4080 116 cmd.exe 150 PID 116 wrote to memory of 4080 116 cmd.exe 150 PID 116 wrote to memory of 1352 116 cmd.exe 151 PID 116 wrote to memory of 1352 116 cmd.exe 151 PID 116 wrote to memory of 3272 116 cmd.exe 154 PID 116 wrote to memory of 3272 116 cmd.exe 154 PID 3272 wrote to memory of 4672 3272 spoolsv.exe 157 PID 3272 wrote to memory of 4672 3272 spoolsv.exe 157 PID 4672 wrote to memory of 2924 4672 cmd.exe 159 PID 4672 wrote to memory of 2924 4672 cmd.exe 159 PID 4672 wrote to memory of 2004 4672 cmd.exe 160 PID 4672 wrote to memory of 2004 4672 cmd.exe 160 PID 4672 wrote to memory of 3788 4672 cmd.exe 162 PID 4672 wrote to memory of 3788 4672 cmd.exe 162 PID 3788 wrote to memory of 3092 3788 spoolsv.exe 164 PID 3788 wrote to memory of 3092 3788 spoolsv.exe 164 PID 3092 wrote to memory of 760 3092 cmd.exe 166 PID 3092 wrote to memory of 760 3092 cmd.exe 166 PID 3092 wrote to memory of 2176 3092 cmd.exe 167 PID 3092 wrote to memory of 2176 3092 cmd.exe 167 PID 3092 wrote to memory of 5056 3092 cmd.exe 170 PID 3092 wrote to memory of 5056 3092 cmd.exe 170 PID 5056 wrote to memory of 4940 5056 spoolsv.exe 173 PID 5056 wrote to memory of 4940 5056 spoolsv.exe 173 PID 4940 wrote to memory of 2264 4940 cmd.exe 175 PID 4940 wrote to memory of 2264 4940 cmd.exe 175 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NursultanAlphaCrack.bat.exe"C:\Users\Admin\AppData\Local\Temp\NursultanAlphaCrack.bat.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\portsurrogateFontCrt\unyQgcnbrXR6kUk3LNilotfJnp9OLZPJv809nYh2EMxHRw3.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\portsurrogateFontCrt\mhHwHj5jfnxhi.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\portsurrogateFontCrt\BlockcontainerWin.exe"C:\portsurrogateFontCrt/BlockcontainerWin.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Security\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Music\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Desktop\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\portsurrogateFontCrt\BlockcontainerWin.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mr8meW3tpm.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:812
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2924
-
-
C:\Program Files\Windows Security\spoolsv.exe"C:\Program Files\Windows Security\spoolsv.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nSTk4tfYD6.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:3192
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4012
-
-
C:\Program Files\Windows Security\spoolsv.exe"C:\Program Files\Windows Security\spoolsv.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5CZTOTC2vN.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\system32\chcp.comchcp 6500110⤵PID:4080
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1352
-
-
C:\Program Files\Windows Security\spoolsv.exe"C:\Program Files\Windows Security\spoolsv.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lYG6WIxzfM.bat"11⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\system32\chcp.comchcp 6500112⤵PID:2924
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2004
-
-
C:\Program Files\Windows Security\spoolsv.exe"C:\Program Files\Windows Security\spoolsv.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3IMqqsTTOd.bat"13⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\system32\chcp.comchcp 6500114⤵PID:760
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2176
-
-
C:\Program Files\Windows Security\spoolsv.exe"C:\Program Files\Windows Security\spoolsv.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2juDPxCKYX.bat"15⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\system32\chcp.comchcp 6500116⤵PID:2264
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:1436
-
-
C:\Program Files\Windows Security\spoolsv.exe"C:\Program Files\Windows Security\spoolsv.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1256 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ogJsYefPP1.bat"17⤵PID:3536
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:516
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4880
-
-
C:\Program Files\Windows Security\spoolsv.exe"C:\Program Files\Windows Security\spoolsv.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5092 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aehWhM7TGU.bat"19⤵PID:4672
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:4968
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:5072
-
-
C:\Program Files\Windows Security\spoolsv.exe"C:\Program Files\Windows Security\spoolsv.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:456 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lYG6WIxzfM.bat"21⤵PID:968
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:3192
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2788
-
-
C:\Program Files\Windows Security\spoolsv.exe"C:\Program Files\Windows Security\spoolsv.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1744 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\o1vNVowh3C.bat"23⤵PID:2500
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:3624
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1964
-
-
C:\Program Files\Windows Security\spoolsv.exe"C:\Program Files\Windows Security\spoolsv.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3396 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Q5hzjQRwNJ.bat"25⤵PID:1444
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:3316
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2408
-
-
C:\Program Files\Windows Security\spoolsv.exe"C:\Program Files\Windows Security\spoolsv.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZPsODb7c4Z.bat"27⤵PID:4276
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:836
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:228⤵PID:3116
-
-
C:\Program Files\Windows Security\spoolsv.exe"C:\Program Files\Windows Security\spoolsv.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lYG6WIxzfM.bat"29⤵PID:1904
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:4376
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1772
-
-
C:\Program Files\Windows Security\spoolsv.exe"C:\Program Files\Windows Security\spoolsv.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Security\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Windows Security\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Security\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Music\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Default\Music\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Music\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Sidebar\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Sidebar\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Desktop\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Public\Desktop\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Desktop\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockcontainerWinB" /sc MINUTE /mo 5 /tr "'C:\portsurrogateFontCrt\BlockcontainerWin.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockcontainerWin" /sc ONLOGON /tr "'C:\portsurrogateFontCrt\BlockcontainerWin.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockcontainerWinB" /sc MINUTE /mo 7 /tr "'C:\portsurrogateFontCrt\BlockcontainerWin.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1136
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD53c93e1d75c4f1682ef0f33b9c0759623
SHA1b725fdf914847d4896aec8e97d7535bed90ed02a
SHA2566905fbb07def20c266499860d66336405ee8a44de59fc7da1ef879ab4bc08b93
SHA51231bbda359f7184f2b45fe4775b4c9b58a1720183964006557292fff8412d179379893816dc760a2b433bdbbb23c9fadaf9975a821734a891db7cbc34b410b5cf
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
221B
MD5a4b7b046e88f7a89482a776a2b2bc9f6
SHA1eaed3f2f9533a4fb31f5e0d41119867dd59d7ff4
SHA2568888bb73bc60cdd425555309dcc3075af64bdf60c52e35ffdbf9dcdf5c9df827
SHA512b4f319aef237756588158de121ba33cab5db77e620fe1a96487340c5950b97b58c4f30598a085cd0a14eb639363dc444e77fa35dd313aa7b20cc54d54caed0df
-
Filesize
173B
MD54b34af56745fbacf82930f33b7eb54b3
SHA1bd30b8762fe3691ab0e32c45ff34308fe07594c2
SHA2567f79b08b4c2a7bf02bac4b6f3215c87069dc83113d6bdf85f1824f61267f18ff
SHA51295bcb2fcaa6d8b0792bbeb6376a786d5e2a80e7fc4fa562267027defd71b474eda7dc8a61513103a48a666f65719bc48562f853ebcd464e777d4d7e4332506a5
-
Filesize
173B
MD5d02e7fa81355f6f84b28fb52993bc5a1
SHA13edb14ac43c697ed1d43219c966ab3dc9a2b490d
SHA25650f81cad81319469c0b79bf8959db7ef04072aa958d6f95e6bf69785d8be3988
SHA51255553b0bd05eb03a00b3899b03259fb6fa55a2c09ba612fc955125a63d9bc63344d1350ca704a65dc3e3482486cac68e737379f887fda85c4f5ad713d421d9cb
-
Filesize
173B
MD54900bef3c2dc3253fb13be9270f1e906
SHA181082783b0deee646f7644fcbd7f68fd3e760134
SHA256d42185f54fb52b2db8d754e25f19d17a6fc0494adf1536f6f865d414c3cf2630
SHA512b16965795adb45e9677a469b0e64f39359224e2a4b55ea33b4fab867fa142144707cd1eccb056dc93b1da1b06c78fa932067cf457687b068e44eabb8a085dd58
-
Filesize
221B
MD56501c1ad63c0a8a67c0848231b155f77
SHA1f45268286b85a0285a4cd6dbe857e92947cd297a
SHA2568f37faca5eff2d15512f79744e92a0058b8db13d9913bb625533b30877b6e8ec
SHA512dad791b8290535c1b87e0212f166dea7e28c76336ad044a36181a1a2351579c657c9ceb35e212696b4e20b33fede03e4cb5ab2c2f53f4f728da5d5c50685f30e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
221B
MD545580d4ffc0bc65483667fd9c584d9d2
SHA14499b6bd002640b33a54cbeaf98c55a109263d58
SHA256f4df5aabeffd73e3e1d2ebfb01db5d850d1dfb3fd59ade7d03d9a083caf48bc4
SHA512af2960933f7c9bab22c2de46af9294b5c07c42389ea552d86779fe732523ed38e1707eac967f38c44145a79ad5296e84637e6891808aab75d2e345077446a435
-
Filesize
173B
MD55308b6755ef7f32185cd68096603e44e
SHA1d081803f2924a71d6e2225641566070b6ae59d92
SHA25670f3d9d1b7e24ab32a61d028830a47a9b2e834e85f59eb741a44294b628e5546
SHA51255010d98f8c9be8e7116d34a934c03508c6a938ecb2461050ef32347b085c38067d07038bf43f92a5787531bdbf6eb247ec6d848fe4b7f5b5d9658304af96543
-
Filesize
173B
MD5b5bee6e1db1b1dcaf76c17a44b5fb586
SHA1a2ce952b494d4f3679ddb2632e0097fa828fb898
SHA25622d4bba79fafbc671fb9cfb37fb7fb42039fa5d7a4eb19b0282fc884c102704a
SHA512efafb9907d302ce54096190f191638915c3f53fab52e1d7750e8dc5223957cdc810a872a34cd7c2e69fc996440339b8b3f78056b08b9358a84145f27a139265c
-
Filesize
173B
MD53ea392ede9ad2513e2eedea9c55c3998
SHA19e3d5e53a818496b6438844509ce395e728e9e04
SHA25684144262d85c210ec64016842e625c6f9d654fe4862c42f1357cef0780e747ff
SHA512b9441acdd72cb86463808e0db55d36e63c4210c29420a59af54672a40f8aadbd42b2d1ad53355c9404c2b358921867a4e8e0a5b713f5aa238cd82e1bcba6d864
-
Filesize
173B
MD5b5d69db9834ae8be919a4a47e916020b
SHA1e3a8d026cd6f358466e2ed5e73dbef05bceee15f
SHA256a13e309074c40b68e0faab299d98d1674905ccc526f22236ad1eea2fcf624545
SHA51262fb4dcc27c2f4abdfc1c7c42932f81d210e6b739c923168fd12ee90af1ebb952ff8ee7f2fdfe568e3b30a8fdee3d0b7fd91ac8482cc782316ce256a55d0cb45
-
Filesize
173B
MD50efd1a5b5150c1281623e6b7eea6f6d0
SHA19c49a08a3e95462a275e1181f0405a080e48bfa2
SHA25659ba98b081121cfb4b0af6b30eaa1300349906cac7fc5a5111aee1b3a8809047
SHA51258319ab6f7467793f7b31b3cdac523e4e2f71d35f72d611ce0cd5a6b2c9bc77f9fcbab0f5a3a8293066202cec0a02d252a3b0efb79aff9727a0529b2187c08c4
-
Filesize
2.4MB
MD5b3f6318c958712d0c78b5a969ee2efd1
SHA1abf4cf8782f366a10df36ff706afeaffd07df514
SHA256e2d2a557cf97f4d81a7d476d3fb5e43405f6e79fe266032dd3d8650d6b81d846
SHA51267f987ca27548c3ef21e7c27990653e1443b0a761262ef2351bf1fd670903e7652e1a215a206b2fc197dba33a661e762f410ab63b1605a2571c1872c75c78912
-
Filesize
85B
MD52f3c3a6c3a477313d6ab3d03f90be8c2
SHA11afe24a9f578c49b35c34855441455ebe4f04369
SHA256ecff07d881b76f45aa8142eb1cb8a1e21f8f1f51217968cc623aa7ff4dfb4aee
SHA512fe223a07eb4b7c8799ecdaf4e149f8d3f902648bddaa55efa28095db2320ff796dd017b3059cba6282e0e085c7b30aa2a4202105e48c7da6c40b19484c3c2d8f
-
Filesize
211B
MD50b67bf20e24eac268c690e05e9e59711
SHA12768696c3fff8aade04325ead3ad4366e9393084
SHA25688907a441f365c8d0ec4f523f0f38f97434528ca151b928cf8f1c29db80afe8a
SHA51264d956b71dc25615b8deea4ce5d8dc3f2b79e7ca6dfa289fb5c73f3fe63e14698a739ddcbb3d257569342d6afe543aa76837f30499405097b356cdaa17b05fcd