Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/01/2025, 12:08
Behavioral task
behavioral1
Sample
DCRatBuild.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DCRatBuild.exe
Resource
win10v2004-20241007-en
General
-
Target
DCRatBuild.exe
-
Size
1.1MB
-
MD5
e57a019d1bc08061c8d91d8f27c22325
-
SHA1
b1a3eadefec298a7f5dafe2d59ced44ff7d6abb3
-
SHA256
09d131517a12fb5f3b9079f920b9ff6328de6955812f592ba6ae31f4287d3617
-
SHA512
83a387cc2b0f33d4b5f6e8e94835f5658b85201e5c8015d83d70e6de3d8bad101643475ffe6e20883fd5a3b9b8249dde5ec0fdb4db082aeba7c0a9b9dc1c5b70
-
SSDEEP
24576:U2G/nvxW3Ww0tGN/1dmETXhEK5LH8wBeHr8N:UbA30GN/1FXhVLcw+rc
Malware Config
Signatures
-
DcRat 46 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 2944 schtasks.exe 1088 schtasks.exe 596 schtasks.exe 2436 schtasks.exe 2824 schtasks.exe File created C:\Program Files\Uninstall Information\f3b6ecef712a24 blockServer.exe 3052 schtasks.exe 2392 schtasks.exe 1716 schtasks.exe 1140 schtasks.exe 3056 schtasks.exe 2620 schtasks.exe 2592 schtasks.exe 1884 schtasks.exe 2244 schtasks.exe 1540 schtasks.exe 1456 schtasks.exe 1864 schtasks.exe 2468 schtasks.exe 2992 schtasks.exe 784 schtasks.exe 2904 schtasks.exe 1740 schtasks.exe 2792 schtasks.exe 2120 schtasks.exe 1992 schtasks.exe 3028 schtasks.exe File created C:\Program Files (x86)\Common Files\System\fr-FR\886983d96e3d3e blockServer.exe 1920 schtasks.exe 2828 schtasks.exe 1620 schtasks.exe 316 schtasks.exe 1648 schtasks.exe 1580 schtasks.exe 880 schtasks.exe 1136 schtasks.exe 2328 schtasks.exe 2060 schtasks.exe 3000 schtasks.exe 920 schtasks.exe 1712 schtasks.exe 2268 schtasks.exe 2776 schtasks.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\56085415360792 blockServer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DCRatBuild.exe 1228 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 42 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 596 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1136 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3056 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1456 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2060 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1580 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2824 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1864 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2392 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1716 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1228 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1620 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 920 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 784 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2468 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2268 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1140 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 316 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2244 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1884 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3028 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1540 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1648 2700 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2700 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0008000000016d18-9.dat dcrat behavioral1/memory/2528-13-0x0000000000E20000-0x0000000000EF6000-memory.dmp dcrat behavioral1/memory/2004-32-0x0000000001250000-0x0000000001326000-memory.dmp dcrat behavioral1/memory/948-45-0x0000000000390000-0x0000000000466000-memory.dmp dcrat behavioral1/memory/2780-63-0x0000000000BD0000-0x0000000000CA6000-memory.dmp dcrat -
Executes dropped EXE 4 IoCs
pid Process 2528 blockServer.exe 2004 blockServer.exe 948 blockServer.exe 2780 blockServer.exe -
Loads dropped DLL 2 IoCs
pid Process 2644 cmd.exe 2644 cmd.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\wininit.exe blockServer.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\56085415360792 blockServer.exe File created C:\Program Files (x86)\Common Files\System\fr-FR\csrss.exe blockServer.exe File created C:\Program Files (x86)\Common Files\System\fr-FR\886983d96e3d3e blockServer.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\69ddcba757bf72 blockServer.exe File created C:\Program Files\Uninstall Information\spoolsv.exe blockServer.exe File created C:\Program Files\Uninstall Information\f3b6ecef712a24 blockServer.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\smss.exe blockServer.exe File opened for modification C:\Program Files\Uninstall Information\spoolsv.exe blockServer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Media\Raga\blockServer.exe blockServer.exe File created C:\Windows\Media\Raga\6fbefe3dfd5bde blockServer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DCRatBuild.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 920 schtasks.exe 784 schtasks.exe 1712 schtasks.exe 2776 schtasks.exe 1740 schtasks.exe 2792 schtasks.exe 1864 schtasks.exe 2392 schtasks.exe 1088 schtasks.exe 1228 schtasks.exe 316 schtasks.exe 1648 schtasks.exe 1136 schtasks.exe 1580 schtasks.exe 2620 schtasks.exe 2992 schtasks.exe 880 schtasks.exe 1716 schtasks.exe 1620 schtasks.exe 2268 schtasks.exe 2592 schtasks.exe 2904 schtasks.exe 2944 schtasks.exe 2436 schtasks.exe 3028 schtasks.exe 3052 schtasks.exe 3000 schtasks.exe 2468 schtasks.exe 1884 schtasks.exe 596 schtasks.exe 2244 schtasks.exe 1456 schtasks.exe 2828 schtasks.exe 2120 schtasks.exe 1992 schtasks.exe 1140 schtasks.exe 2328 schtasks.exe 3056 schtasks.exe 1920 schtasks.exe 2060 schtasks.exe 2824 schtasks.exe 1540 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2528 blockServer.exe 2004 blockServer.exe 948 blockServer.exe 948 blockServer.exe 948 blockServer.exe 2780 blockServer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2528 blockServer.exe Token: SeDebugPrivilege 2004 blockServer.exe Token: SeDebugPrivilege 948 blockServer.exe Token: SeDebugPrivilege 2780 blockServer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2780 2768 DCRatBuild.exe 30 PID 2768 wrote to memory of 2780 2768 DCRatBuild.exe 30 PID 2768 wrote to memory of 2780 2768 DCRatBuild.exe 30 PID 2768 wrote to memory of 2780 2768 DCRatBuild.exe 30 PID 2780 wrote to memory of 2644 2780 WScript.exe 31 PID 2780 wrote to memory of 2644 2780 WScript.exe 31 PID 2780 wrote to memory of 2644 2780 WScript.exe 31 PID 2780 wrote to memory of 2644 2780 WScript.exe 31 PID 2644 wrote to memory of 2528 2644 cmd.exe 33 PID 2644 wrote to memory of 2528 2644 cmd.exe 33 PID 2644 wrote to memory of 2528 2644 cmd.exe 33 PID 2644 wrote to memory of 2528 2644 cmd.exe 33 PID 2528 wrote to memory of 1760 2528 blockServer.exe 53 PID 2528 wrote to memory of 1760 2528 blockServer.exe 53 PID 2528 wrote to memory of 1760 2528 blockServer.exe 53 PID 1760 wrote to memory of 1452 1760 cmd.exe 55 PID 1760 wrote to memory of 1452 1760 cmd.exe 55 PID 1760 wrote to memory of 1452 1760 cmd.exe 55 PID 1760 wrote to memory of 2004 1760 cmd.exe 56 PID 1760 wrote to memory of 2004 1760 cmd.exe 56 PID 1760 wrote to memory of 2004 1760 cmd.exe 56 PID 2004 wrote to memory of 3040 2004 blockServer.exe 66 PID 2004 wrote to memory of 3040 2004 blockServer.exe 66 PID 2004 wrote to memory of 3040 2004 blockServer.exe 66 PID 3040 wrote to memory of 1316 3040 cmd.exe 68 PID 3040 wrote to memory of 1316 3040 cmd.exe 68 PID 3040 wrote to memory of 1316 3040 cmd.exe 68 PID 3040 wrote to memory of 948 3040 cmd.exe 69 PID 3040 wrote to memory of 948 3040 cmd.exe 69 PID 3040 wrote to memory of 948 3040 cmd.exe 69 PID 948 wrote to memory of 2760 948 blockServer.exe 85 PID 948 wrote to memory of 2760 948 blockServer.exe 85 PID 948 wrote to memory of 2760 948 blockServer.exe 85 PID 2760 wrote to memory of 2692 2760 cmd.exe 87 PID 2760 wrote to memory of 2692 2760 cmd.exe 87 PID 2760 wrote to memory of 2692 2760 cmd.exe 87 PID 2760 wrote to memory of 2780 2760 cmd.exe 88 PID 2760 wrote to memory of 2780 2760 cmd.exe 88 PID 2760 wrote to memory of 2780 2760 cmd.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"1⤵
- DcRat
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ComWebSessionbroker\JasNTlJ43oUjNOXJ6GLnSa5WXs.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ComWebSessionbroker\1ajAOSAhS.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\ComWebSessionbroker\blockServer.exe"C:\ComWebSessionbroker\blockServer.exe"4⤵
- DcRat
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\H0G7vj5bZc.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1452
-
-
C:\ComWebSessionbroker\blockServer.exe"C:\ComWebSessionbroker\blockServer.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ar0OY31ljn.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:1316
-
-
C:\ComWebSessionbroker\blockServer.exe"C:\ComWebSessionbroker\blockServer.exe"8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BwUTRvcgyk.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:2692
-
-
C:\Windows\Media\Raga\blockServer.exe"C:\Windows\Media\Raga\blockServer.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files\Uninstall Information\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Program Files\Uninstall Information\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\ComWebSessionbroker\taskhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\ComWebSessionbroker\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\ComWebSessionbroker\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Common Files\System\fr-FR\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\System\fr-FR\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Common Files\System\fr-FR\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Favorites\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Public\Favorites\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Favorites\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\ComWebSessionbroker\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\ComWebSessionbroker\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\ComWebSessionbroker\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "blockServerb" /sc MINUTE /mo 6 /tr "'C:\Windows\Media\Raga\blockServer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "blockServer" /sc ONLOGON /tr "'C:\Windows\Media\Raga\blockServer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "blockServerb" /sc MINUTE /mo 14 /tr "'C:\Windows\Media\Raga\blockServer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5d3d25823ce836fca7f72fe2538d7920d
SHA171738f97c44dc40a6668e636c54c2afd9ede370f
SHA25660b5d65e7af9bf924503bc1b62c30381b859504c08cc23316dba55107bfc739d
SHA5128528a66f0e71446dd42300c39a2e52d78f34afcad2fdf477311074322b1628d192533996864e11d27f702e333cc37468b32f5346109159092206bf68d45e73b7
-
Filesize
205B
MD5b7f0ab71e54ffa7c8748b76dc631cd43
SHA1769a64d7483fa72d61a1d15f10c1b1401fae10f3
SHA256871d73883a509ab02bf2dda5098434a5ac7430b0ef65c6400190e4171f4b540c
SHA5126edbe941b8325a7e7dc7cf453044226a8dcf7258f8d526822efe028a56daf74b7fb90ebaf4ede855367872006e106922d280df9cbcb2fd4bdfead21bb0bfd267
-
Filesize
202B
MD57aaf25448b4c6d253d286a8ac6f925dc
SHA1256a42fc730dee0e3c7b3a347520f2c92d7c2479
SHA25685d0e391418985c18d3f6fc25aa839017b73b02b2c1dc84fbda69b0d80326155
SHA5127cd916a0916fbf3d3834a86c93c1304ac13c4f37295aa2475b0618ded7f70985bc8cfd9363dace377bf5fe8b1d552429eb842a402628e8c38439fa9fe42bed15
-
Filesize
203B
MD52a90b9199cafe8d5db1398b244cbe45b
SHA1c56400e0ff085f72558c41fd65af4eb3ea9da840
SHA256129fc8c4f5b557aa78515035994f88fc280efeb4df787a5db0159d1c81114896
SHA5123c48429e3feed705baf1d72a3ce2e2296ff21bcbea5b7c2cd42c1f5acb51523bdb65b1ecc4743900afbf70f9632d252c47dab68eef86da409acf7933cedf2c4e
-
Filesize
203B
MD53832c38fd2ae294cfdb1cf65cca24755
SHA13ea96b1e1fc2680f0137052762d80ff3a23a98bb
SHA25631c6887b7242a78cf48e7dca3065afdf1d0b852031954dee83b687a6927a7dfc
SHA512ba01f438341cf65fbc74b6584cc9d89b042f1870772ecbe0d557a0818dc5b584ae71d53e7032c778b64985f57b8314881f695cc803c99941c26fa1faae538b6e
-
Filesize
829KB
MD5579731eb1a659552a99fcbf80d358779
SHA1e96a8cb05ae216cd003a298fe559663a57d21b31
SHA256fd4d52c4ef4fd4378086c952f612b749279ed96f50ad66a815077196e8686585
SHA512f84002afbd1cdb377aead468ea3713177bf3abbaf15155cf412e0eb7247e30d964f0eb370ef257675d41bf0e2bc5eeebe975392ebca327f874afb147f5a57647