Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 05:38
Behavioral task
behavioral1
Sample
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe
Resource
win10v2004-20241007-en
General
-
Target
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe
-
Size
1.1MB
-
MD5
d2f57cf55387c9146158f49dbcf5b540
-
SHA1
57fb9892bdf6362073eb3cb1452a291568b49e23
-
SHA256
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692
-
SHA512
5d2da7dcbe87ceee345b95d99fc47a209a5621c88483fdb3484493f75fe0e8cc5802703dcd44e068a83738401b7e6a8edaeef7b098a804ae4989ccfb2ef4f78e
-
SSDEEP
24576:U2G/nvxW3Ww0tI2qYVrBvevwx8P9brkuXq:UbA30I2TvkPOf
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2476 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1364 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1872 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1856 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1592 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 992 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2316 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1824 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2772 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2268 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1832 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2480 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 340 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1396 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 2524 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 920 2524 schtasks.exe 33 -
resource yara_rule behavioral1/files/0x00080000000174b4-12.dat dcrat behavioral1/memory/2572-13-0x00000000012C0000-0x0000000001396000-memory.dmp dcrat behavioral1/memory/888-43-0x00000000011C0000-0x0000000001296000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 2572 MsBlock.exe 888 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2544 cmd.exe 2544 cmd.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Reference Assemblies\c5b4cb5e9653cc MsBlock.exe File created C:\Program Files (x86)\Windows Defender\WmiPrvSE.exe MsBlock.exe File created C:\Program Files (x86)\Windows Defender\24dbde2999530e MsBlock.exe File created C:\Program Files\Windows Portable Devices\MsBlock.exe MsBlock.exe File created C:\Program Files\Windows Portable Devices\1117dcd0522c0e MsBlock.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\cmd.exe MsBlock.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\ebf1f9fa8afd6d MsBlock.exe File created C:\Program Files (x86)\Reference Assemblies\services.exe MsBlock.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\explorer.exe MsBlock.exe File created C:\Windows\Fonts\7a0fd90576e088 MsBlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2312 schtasks.exe 2424 schtasks.exe 2476 schtasks.exe 1832 schtasks.exe 1088 schtasks.exe 2160 schtasks.exe 992 schtasks.exe 1796 schtasks.exe 2940 schtasks.exe 1656 schtasks.exe 2268 schtasks.exe 920 schtasks.exe 1628 schtasks.exe 1044 schtasks.exe 2324 schtasks.exe 2772 schtasks.exe 1480 schtasks.exe 3020 schtasks.exe 340 schtasks.exe 1396 schtasks.exe 2084 schtasks.exe 2316 schtasks.exe 1824 schtasks.exe 2480 schtasks.exe 1872 schtasks.exe 1856 schtasks.exe 1288 schtasks.exe 3016 schtasks.exe 1364 schtasks.exe 2348 schtasks.exe 1060 schtasks.exe 1592 schtasks.exe 2596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2572 MsBlock.exe 2572 MsBlock.exe 2572 MsBlock.exe 2572 MsBlock.exe 2572 MsBlock.exe 888 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2572 MsBlock.exe Token: SeDebugPrivilege 888 cmd.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2560 2812 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe 29 PID 2812 wrote to memory of 2560 2812 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe 29 PID 2812 wrote to memory of 2560 2812 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe 29 PID 2812 wrote to memory of 2560 2812 9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe 29 PID 2560 wrote to memory of 2544 2560 WScript.exe 30 PID 2560 wrote to memory of 2544 2560 WScript.exe 30 PID 2560 wrote to memory of 2544 2560 WScript.exe 30 PID 2560 wrote to memory of 2544 2560 WScript.exe 30 PID 2544 wrote to memory of 2572 2544 cmd.exe 32 PID 2544 wrote to memory of 2572 2544 cmd.exe 32 PID 2544 wrote to memory of 2572 2544 cmd.exe 32 PID 2544 wrote to memory of 2572 2544 cmd.exe 32 PID 2572 wrote to memory of 1776 2572 MsBlock.exe 67 PID 2572 wrote to memory of 1776 2572 MsBlock.exe 67 PID 2572 wrote to memory of 1776 2572 MsBlock.exe 67 PID 1776 wrote to memory of 2976 1776 cmd.exe 69 PID 1776 wrote to memory of 2976 1776 cmd.exe 69 PID 1776 wrote to memory of 2976 1776 cmd.exe 69 PID 1776 wrote to memory of 888 1776 cmd.exe 70 PID 1776 wrote to memory of 888 1776 cmd.exe 70 PID 1776 wrote to memory of 888 1776 cmd.exe 70 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe"C:\Users\Admin\AppData\Local\Temp\9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\intoHost\pN2iKIl2JrbfNIx.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\intoHost\z07BaoIs8R5lt5yU6uoZdloB3t.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\intoHost\MsBlock.exe"C:\intoHost\MsBlock.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WDmPejn0l4.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\cmd.exe"C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\cmd.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Reference Assemblies\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Reference Assemblies\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Defender\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Defender\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Windows\Fonts\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\Fonts\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Windows\Fonts\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\Default User\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\intoHost\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\intoHost\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\intoHost\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsBlockM" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Portable Devices\MsBlock.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsBlock" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\MsBlock.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsBlockM" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Portable Devices\MsBlock.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5272823c4cbbcb47abc32d15649c6b814
SHA107295d91deddcd42bc658c7d14ce10733d979b12
SHA2563e15842c3d2b9ac9a247aebfbc27f7b0b60e38bf18f29ff8c91b68a1a3c33441
SHA5126224b627ca81848f3cf6de1280b3a1f56061b89f8c1f099377af1fef5146aa5d931f443229b0f5aa3d2bc22c0a97280d0ed5bf089cb1edc93b20c44630aa18ba
-
Filesize
828KB
MD5dca7880645d6318a20d020f2a51b7a8c
SHA15c5e493ce685a79ecb58ef2fdc6d9a4364c0a276
SHA2569c03c25f02d71bfc3ab23870d882274e9b34626d1374491529818e19851510b9
SHA5123fa226e65382fed9f3dd959e80e4483866da3b339c277906ab1b08db067be6f6ec1d73b9ad3067b4046e512f8f08940528bf8573edc83d999f18f890fc210807
-
Filesize
211B
MD5672ef18aa1c9cf2cf6c906bba7d1435b
SHA14d72a4c6cb3aaeef5b02cef71ad42211f185c93a
SHA256a016b82ba799c1cf780c9ebb6cf0540c26aad664f5525d1ccc8b470fdaaa0075
SHA5128b5d37f4fb7b1df56118866f9cc18d0ce323167185258b2e8b830d91f20e2ee85eda6b145f25d363630790ddf7d188eb1507f051095fc63be4bfaef1760bc20e
-
Filesize
25B
MD55c9b6d735522c5246a33bbadaa92c7db
SHA1f676e86ecb933d676095e187a50febbd61bbc344
SHA25647148fdb946ede0b9fab190f1ae5dd459d096873cca3585642183674313fe551
SHA51263fafa045ca419b1394b2255ef32bf4fb6a40ff8b45ade892723ec41a50a831cce7c4266e489f825dc4e574d07b38e216c12337a89743c70e6de35470e798875