Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
EC5FDACECCEEE343335D6A686CE75864.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
EC5FDACECCEEE343335D6A686CE75864.exe
Resource
win10v2004-20241007-en
General
-
Target
EC5FDACECCEEE343335D6A686CE75864.exe
-
Size
2.1MB
-
MD5
ec5fdacecceee343335d6a686ce75864
-
SHA1
965f210fa2eccd71a866908320cb92eb926b338d
-
SHA256
d546328a43690c42bc768a5a07588bb43eb0a0962f5994b50fb5108156bc89ad
-
SHA512
533713c84dfcd9d23ffb338d9dd5c237ef6151315037ed8477f91bd89bad02639ee9e936cfc2ea5098f2bbff9e565115b14f71e287297d11328cf9c030512a4c
-
SSDEEP
49152:IBJi/YtO8s26Kzc1OpFAuD86cmG96kZTRc:ycoxd6Yc1+rXG3Rc
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Registry.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\SppExtComObj.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\SppExtComObj.exe\", \"C:\\Program Files\\Microsoft Office 15\\ClientX64\\RuntimeBroker.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\SppExtComObj.exe\", \"C:\\Program Files\\Microsoft Office 15\\ClientX64\\RuntimeBroker.exe\", \"C:\\Windows\\Resources\\dllhost.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\SppExtComObj.exe\", \"C:\\Program Files\\Microsoft Office 15\\ClientX64\\RuntimeBroker.exe\", \"C:\\Windows\\Resources\\dllhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\dllhost.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\SppExtComObj.exe\", \"C:\\Program Files\\Microsoft Office 15\\ClientX64\\RuntimeBroker.exe\", \"C:\\Windows\\Resources\\dllhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\dllhost.exe\", \"C:\\WebWinBrokerDll\\BridgeServerruntime.exe\"" BridgeServerruntime.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 828 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4900 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3964 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4000 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4272 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 432 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3196 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4924 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3704 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2408 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2496 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5064 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3076 3596 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 3596 schtasks.exe 86 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation EC5FDACECCEEE343335D6A686CE75864.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation BridgeServerruntime.exe -
Executes dropped EXE 2 IoCs
pid Process 3308 BridgeServerruntime.exe 4380 Registry.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Recovery\\WindowsRE\\Registry.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\SppExtComObj.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Microsoft Office 15\\ClientX64\\RuntimeBroker.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\Resources\\dllhost.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Windows NT\\TableTextService\\dllhost.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BridgeServerruntime = "\"C:\\WebWinBrokerDll\\BridgeServerruntime.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BridgeServerruntime = "\"C:\\WebWinBrokerDll\\BridgeServerruntime.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Recovery\\WindowsRE\\Registry.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\SppExtComObj.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Microsoft Office 15\\ClientX64\\RuntimeBroker.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\Resources\\dllhost.exe\"" BridgeServerruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Windows NT\\TableTextService\\dllhost.exe\"" BridgeServerruntime.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC640DA536398748EB8435C4027D22287.TMP csc.exe File created \??\c:\Windows\System32\s_kgxh.exe csc.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\Microsoft Office 15\ClientX64\9e8d7a4ca61bd9 BridgeServerruntime.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\SppExtComObj.exe BridgeServerruntime.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\e1ef82546f0b02 BridgeServerruntime.exe File created C:\Program Files (x86)\Windows NT\TableTextService\dllhost.exe BridgeServerruntime.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\dllhost.exe BridgeServerruntime.exe File created C:\Program Files (x86)\Windows NT\TableTextService\5940a34987c991 BridgeServerruntime.exe File created C:\Program Files\Microsoft Office 15\ClientX64\RuntimeBroker.exe BridgeServerruntime.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Resources\5940a34987c991 BridgeServerruntime.exe File created C:\Windows\Resources\dllhost.exe BridgeServerruntime.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EC5FDACECCEEE343335D6A686CE75864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings EC5FDACECCEEE343335D6A686CE75864.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings BridgeServerruntime.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2496 schtasks.exe 828 schtasks.exe 4900 schtasks.exe 2312 schtasks.exe 3964 schtasks.exe 4272 schtasks.exe 432 schtasks.exe 3196 schtasks.exe 3048 schtasks.exe 2408 schtasks.exe 3076 schtasks.exe 2736 schtasks.exe 1700 schtasks.exe 2628 schtasks.exe 4000 schtasks.exe 4924 schtasks.exe 3704 schtasks.exe 5064 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe 3308 BridgeServerruntime.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3308 BridgeServerruntime.exe Token: SeDebugPrivilege 4380 Registry.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4848 wrote to memory of 3204 4848 EC5FDACECCEEE343335D6A686CE75864.exe 82 PID 4848 wrote to memory of 3204 4848 EC5FDACECCEEE343335D6A686CE75864.exe 82 PID 4848 wrote to memory of 3204 4848 EC5FDACECCEEE343335D6A686CE75864.exe 82 PID 3204 wrote to memory of 2004 3204 WScript.exe 90 PID 3204 wrote to memory of 2004 3204 WScript.exe 90 PID 3204 wrote to memory of 2004 3204 WScript.exe 90 PID 2004 wrote to memory of 3308 2004 cmd.exe 92 PID 2004 wrote to memory of 3308 2004 cmd.exe 92 PID 3308 wrote to memory of 3936 3308 BridgeServerruntime.exe 96 PID 3308 wrote to memory of 3936 3308 BridgeServerruntime.exe 96 PID 3936 wrote to memory of 1584 3936 csc.exe 98 PID 3936 wrote to memory of 1584 3936 csc.exe 98 PID 3308 wrote to memory of 4772 3308 BridgeServerruntime.exe 114 PID 3308 wrote to memory of 4772 3308 BridgeServerruntime.exe 114 PID 4772 wrote to memory of 4724 4772 cmd.exe 116 PID 4772 wrote to memory of 4724 4772 cmd.exe 116 PID 4772 wrote to memory of 4316 4772 cmd.exe 117 PID 4772 wrote to memory of 4316 4772 cmd.exe 117 PID 4772 wrote to memory of 4380 4772 cmd.exe 119 PID 4772 wrote to memory of 4380 4772 cmd.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\EC5FDACECCEEE343335D6A686CE75864.exe"C:\Users\Admin\AppData\Local\Temp\EC5FDACECCEEE343335D6A686CE75864.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\WebWinBrokerDll\d7VV42fpHwMzBQMSzwM0QGomZi6nsu6X6fwca17SIFxI7SHNedkYCWqtFx6.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\WebWinBrokerDll\OH5MsEg2KeRkhqJt.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\WebWinBrokerDll\BridgeServerruntime.exe"C:\WebWinBrokerDll/BridgeServerruntime.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ytmjijja\ytmjijja.cmdline"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF09A.tmp" "c:\Windows\System32\CSC640DA536398748EB8435C4027D22287.TMP"6⤵PID:1584
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5Us7SiCACb.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:4724
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:4316
-
-
C:\Recovery\WindowsRE\Registry.exe"C:\Recovery\WindowsRE\Registry.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\ClientX64\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Windows\Resources\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Resources\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Windows\Resources\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BridgeServerruntimeB" /sc MINUTE /mo 13 /tr "'C:\WebWinBrokerDll\BridgeServerruntime.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BridgeServerruntime" /sc ONLOGON /tr "'C:\WebWinBrokerDll\BridgeServerruntime.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BridgeServerruntimeB" /sc MINUTE /mo 11 /tr "'C:\WebWinBrokerDll\BridgeServerruntime.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD57e41dee55ab5e2f17c41c93defa4426e
SHA117bf179135a92ee80016e12d670571f5bcf37fb8
SHA2564a2b976eeb2f650243882038ba6065d60725d7f7365018c6c8cf96cb419f5df7
SHA51206ebdf4e731b393fbaf653cc60d2dbbefdf7f2d6140169977c2a07ce406c415f9a901993c1eb1d9bdc2aa7c1f6a7f7d87552b43fe260ce2b3d7ae86dd06b3eff
-
Filesize
1KB
MD5b3e847e867b0c4ac9382d9dd22a42cab
SHA1570dad8f8bc141754e48941188030b453f0fe66b
SHA2568200fe0f25d5a06be87b52ff605e986673843757ba4b9a32e9dcabbc298a3de3
SHA5122d5ecaa97c9da3bae82a3426b7077cc54df7319278802fd2947f20190a638cd74732e812f609d0952dc25921eeec3669bde5088882e26ca9d47b760c5af984b8
-
Filesize
1.8MB
MD556554dd4e4fb40b0b5e23cbac2632fda
SHA1639002e98be388ecb14d2b973388531a124f2311
SHA256e93b10e93c375f1e7a2ad0df4c213a1630d64cac96e6467dd0926b2d44dac295
SHA5128bc6fb271d6459dcf0c27794dc9f90b83d606c100bc762ada33df238011d0518c85da3c64b37f451706a67030cc99f6a1194d65e2bc5a30ed1e5e029a3bb7288
-
Filesize
107B
MD541c6e0e5b5a7be33fd9e1f2c02adcc1e
SHA11fb52df44fb4a90bcc7311238dedfc1b9ccc6b4f
SHA256f873310a27b36240c42e0d93c877096e7163d2de480caf83fdce2ef1168376e9
SHA512a1ca006a8d9300f3743350243bf90629522bb2f71c80a8f3a6cc41759a5746a9bbe932b69e4ca46de7de3c555d66fe2f86c13a717806cc9acdbc80f02525c0be
-
Filesize
210B
MD57f45c1ae3ffa088fd090281714ccd636
SHA1e256ac2063feb5bbda9261ebd6941fe391fd5e62
SHA256096a645b2d6d4d076b4ee48d1e88372c59f895ce7db2a31d8f8aa0132d7ea5bd
SHA512cadcc93806689bf5b7c3679d160bc9000d6597fea1143f60fa98cc3bcc3107d0efeb2abf661d37ac80189d01fba1e43c533a0f0f31b006eda2175a2f558526b5
-
Filesize
366B
MD553882f0e886941001b9b7eacf4378d3c
SHA14d1a26a3ea1d3c584565b0bc47927c2d9f2b4ecb
SHA2569eb0612bcf992fa319ad1445db4e4f06b82a0a2b43a2e3057e59336a1b6f8f74
SHA5122881d3d9c7a35cde9740a174907a99e50c12985c9ab58f6d3a6e18ca871a20c29032dcfadb9b7ae8c6eed91a92e9ec336af0e94fc44ddc7e664f543c10c6fcef
-
Filesize
235B
MD533ffba94f10857e663add7bc6a2b2daa
SHA1d6cd6479707f84877e039e63dcb7160868fbc47c
SHA25661dcbb3b54d8c7861269f2812a002fe972de981af5391ec8180623f8b170f7e3
SHA5125ab275f0174563e814e08d86f968418f4f6c94b8a1b2885c4d011e872f664de8c900080b8b253fc899552864069dd30085e1c76dddbf2a076ccf8784cdedbd1a
-
Filesize
1KB
MD5634e281a00b7b9f516c3048badfa1530
SHA1af6369715ce2fe9b99609e470d4f66698880a35a
SHA2560d990336ae793f3f6903048004c8d707d7a7191927bd7df46b7fe887116506c8
SHA5121cb35fa0759f5362c9c7eee5546710874121005a3924bcfec2cf33ac90a257a807ce7ec0db7bc84dcb327604d708009449c34f52560ed936b54eeba49be7d27b