Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 03:44
Behavioral task
behavioral1
Sample
154029aecb8134930418ece2437864b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
154029aecb8134930418ece2437864b8.exe
Resource
win10v2004-20241007-en
General
-
Target
154029aecb8134930418ece2437864b8.exe
-
Size
1.5MB
-
MD5
154029aecb8134930418ece2437864b8
-
SHA1
a43825d5c82e4266a37e60a746c31ab128b2a4a1
-
SHA256
394c5bdb282b16f8fc323f01c9a0ebe0a3824c95efbc082a5ae7b1d547ab3617
-
SHA512
2cc0dd8965fb53479fed5107ec2b8ba90ae15dbbc22f1d0d7bffc573cf049d69ce745840fdaa582060940f5be8381cfd5ecec870943d6a3ddda95c9f32a9826c
-
SSDEEP
24576:u/R6JpYYCpuA5TwiNgFE/4vZy270wlc8cz4lc2zVg5OlyxJ:uZ6a8+DsZ5lyzIcUawly
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4072 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1984 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3300 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3780 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3732 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4136 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1124 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1544 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4292 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3660 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4240 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2392 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1860 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 864 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 456 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1912 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1968 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4760 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4852 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4108 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 228 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2100 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1564 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1960 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4488 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4112 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3964 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4996 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4344 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1316 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1364 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3920 4984 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5080 4984 schtasks.exe 82 -
resource yara_rule behavioral2/memory/4436-1-0x0000000000010000-0x00000000001A2000-memory.dmp dcrat behavioral2/files/0x000b000000023b54-21.dat dcrat behavioral2/files/0x000b000000023b89-68.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 154029aecb8134930418ece2437864b8.exe -
Executes dropped EXE 1 IoCs
pid Process 2708 sppsvc.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\InputMethod\JPN\spoolsv.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\SysWOW64\InputMethod\JPN\f3b6ecef712a24 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\SysWOW64\InputMethod\JPN\RCX8394.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\SysWOW64\InputMethod\JPN\RCX8395.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\SysWOW64\InputMethod\JPN\spoolsv.exe 154029aecb8134930418ece2437864b8.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\RCX8A32.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\lsass.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Windows Multimedia Platform\RCX8EC9.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Windows Multimedia Platform\RCX8ECA.tmp 154029aecb8134930418ece2437864b8.exe File created C:\Program Files (x86)\Windows Portable Devices\fontdrvhost.exe 154029aecb8134930418ece2437864b8.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\6203df4a6bafc7 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\RCX7D64.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Crashpad\reports\lsass.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Reference Assemblies\RCX7F6A.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Crashpad\reports\RCX882C.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Windows Multimedia Platform\winlogon.exe 154029aecb8134930418ece2437864b8.exe File created C:\Program Files\Reference Assemblies\dllhost.exe 154029aecb8134930418ece2437864b8.exe File created C:\Program Files\Reference Assemblies\5940a34987c991 154029aecb8134930418ece2437864b8.exe File created C:\Program Files\Windows Multimedia Platform\cc11b995f2a76d 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\fontdrvhost.exe 154029aecb8134930418ece2437864b8.exe File created C:\Program Files\Windows Multimedia Platform\winlogon.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Reference Assemblies\RCX7F69.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Crashpad\reports\RCX882D.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\RCX8A31.tmp 154029aecb8134930418ece2437864b8.exe File created C:\Program Files (x86)\Windows Portable Devices\5b884080fd4f94 154029aecb8134930418ece2437864b8.exe File created C:\Program Files\Crashpad\reports\lsass.exe 154029aecb8134930418ece2437864b8.exe File created C:\Program Files\Crashpad\reports\6203df4a6bafc7 154029aecb8134930418ece2437864b8.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\lsass.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\RCX7D65.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Program Files\Reference Assemblies\dllhost.exe 154029aecb8134930418ece2437864b8.exe -
Drops file in Windows directory 30 IoCs
description ioc Process File created C:\Windows\tracing\c5b4cb5e9653cc 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\tracing\RCX92F4.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\ShellExperiences\RCX950A.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\DiagTrack\Scenarios\lsass.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\Fonts\lsass.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\Cursors\0a1fd5f707cd16 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\DiagTrack\Scenarios\RCX784F.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Fonts\RCX7A94.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Setup\State\RCX8616.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\tracing\RCX92F5.tmp 154029aecb8134930418ece2437864b8.exe File created C:\Windows\DiagTrack\Scenarios\6203df4a6bafc7 154029aecb8134930418ece2437864b8.exe File created C:\Windows\Setup\State\winlogon.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\ShellExperiences\taskhostw.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Cursors\sppsvc.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\tracing\services.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\ShellExperiences\ea9f0e6c9e2dcd 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Cursors\RCX817E.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Setup\State\RCX8617.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Setup\State\winlogon.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\Fonts\6203df4a6bafc7 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\ShellExperiences\RCX9509.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Fonts\RCX7A93.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Cursors\RCX817F.tmp 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\tracing\services.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\ShellExperiences\taskhostw.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\DiagTrack\Scenarios\lsass.exe 154029aecb8134930418ece2437864b8.exe File created C:\Windows\Setup\State\cc11b995f2a76d 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\DiagTrack\Scenarios\RCX7850.tmp 154029aecb8134930418ece2437864b8.exe File created C:\Windows\Cursors\sppsvc.exe 154029aecb8134930418ece2437864b8.exe File opened for modification C:\Windows\Fonts\lsass.exe 154029aecb8134930418ece2437864b8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 154029aecb8134930418ece2437864b8.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4136 schtasks.exe 1948 schtasks.exe 1904 schtasks.exe 2972 schtasks.exe 1316 schtasks.exe 3780 schtasks.exe 3004 schtasks.exe 3732 schtasks.exe 5080 schtasks.exe 4072 schtasks.exe 2136 schtasks.exe 1564 schtasks.exe 4760 schtasks.exe 1164 schtasks.exe 1920 schtasks.exe 1984 schtasks.exe 1544 schtasks.exe 2440 schtasks.exe 1912 schtasks.exe 2100 schtasks.exe 4488 schtasks.exe 3660 schtasks.exe 456 schtasks.exe 1828 schtasks.exe 1148 schtasks.exe 864 schtasks.exe 228 schtasks.exe 4108 schtasks.exe 4996 schtasks.exe 4344 schtasks.exe 1860 schtasks.exe 1968 schtasks.exe 4852 schtasks.exe 3964 schtasks.exe 3300 schtasks.exe 2816 schtasks.exe 4292 schtasks.exe 1780 schtasks.exe 1960 schtasks.exe 4112 schtasks.exe 1364 schtasks.exe 3920 schtasks.exe 1124 schtasks.exe 4240 schtasks.exe 2392 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 4436 154029aecb8134930418ece2437864b8.exe 2708 sppsvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4436 154029aecb8134930418ece2437864b8.exe Token: SeDebugPrivilege 2708 sppsvc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4436 wrote to memory of 2708 4436 154029aecb8134930418ece2437864b8.exe 131 PID 4436 wrote to memory of 2708 4436 154029aecb8134930418ece2437864b8.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\154029aecb8134930418ece2437864b8.exe"C:\Users\Admin\AppData\Local\Temp\154029aecb8134930418ece2437864b8.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\Cursors\sppsvc.exe"C:\Windows\Cursors\sppsvc.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Windows\DiagTrack\Scenarios\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\DiagTrack\Scenarios\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Windows\DiagTrack\Scenarios\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Windows\Fonts\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\Fonts\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Windows\Fonts\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Portable Devices\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Portable Devices\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Reference Assemblies\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files\Reference Assemblies\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Windows\Cursors\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Cursors\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Windows\Cursors\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Windows\SysWOW64\InputMethod\JPN\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\SysWOW64\InputMethod\JPN\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Windows\SysWOW64\InputMethod\JPN\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Windows\Setup\State\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\Setup\State\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Windows\Setup\State\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Program Files\Crashpad\reports\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Crashpad\reports\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files\Crashpad\reports\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Multimedia Platform\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Multimedia Platform\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Videos\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default\Videos\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Videos\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Windows\tracing\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\tracing\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Windows\tracing\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 11 /tr "'C:\Windows\ShellExperiences\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\ShellExperiences\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\Windows\ShellExperiences\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Admin\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5154029aecb8134930418ece2437864b8
SHA1a43825d5c82e4266a37e60a746c31ab128b2a4a1
SHA256394c5bdb282b16f8fc323f01c9a0ebe0a3824c95efbc082a5ae7b1d547ab3617
SHA5122cc0dd8965fb53479fed5107ec2b8ba90ae15dbbc22f1d0d7bffc573cf049d69ce745840fdaa582060940f5be8381cfd5ecec870943d6a3ddda95c9f32a9826c
-
Filesize
1.5MB
MD5b66ab928d005c01e272ac126df443b9a
SHA1aa31d93b26e4172953a46a3c9b68a3221e69220a
SHA2566344d2c73350e07c8e30d64180483de154713efe517422b4b23d6a9de376901e
SHA5122d738a0854c1e9e83f9a6e03978e9bb10ba33869f34cfe4cbfb85b22e478269b5f23b5f5f77509b5f4e40d20c242ae0779e308c460f45beb342002ec03afb53e