Analysis

  • max time kernel
    92s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 02:06

General

  • Target

    13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe

  • Size

    2.7MB

  • MD5

    f9b06779ef8886e3db38dd8edf2c8ae7

  • SHA1

    87c11d3f703d6690f5e6aefa5ddabd0eccdb2c43

  • SHA256

    13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3

  • SHA512

    e7191e615d4fe09136ff49f6e33cc219da7c3421259bc1f648e59e1cfc9c9d93970cb68dd6d8af072ad93867e14d71aa54e41c70d91d31a49b09dbb497d1a5b0

  • SSDEEP

    49152:EGBMeNyllOBdHoYMPRdpOIzP1hu8yPhynpFkn1bkrfWv1LW35IS8CD+isjlQ:BMB7gJUfJ9hcPIpFqtkTWv1w5IgWi

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 57 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 9 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 45 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 57 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe
    "C:\Users\Admin\AppData\Local\Temp\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1236
    • C:\Windows\System32\bg-BG\spoolsv.exe
      "C:\Windows\System32\bg-BG\spoolsv.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:3652
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\services.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1948
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4388
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4108
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec31" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Documents\My Music\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3324
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3" /sc ONLOGON /tr "'C:\Users\Default\Documents\My Music\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1016
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec31" /sc MINUTE /mo 8 /tr "'C:\Users\Default\Documents\My Music\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:760
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Portable Devices\RuntimeBroker.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1408
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1140
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1760
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1928
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1132
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4664
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Java\jre-1.8\System.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:5056
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Java\jre-1.8\System.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:5080
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Program Files\Java\jre-1.8\System.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:244
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Sidebar\SearchApp.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:5036
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\SearchApp.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4316
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Sidebar\SearchApp.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3000
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Program Files\Common Files\upfc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:528
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\Common Files\upfc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2820
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Program Files\Common Files\upfc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:32
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4660
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4360
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4076
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Windows\Microsoft.NET\TextInputHost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2436
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\TextInputHost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2288
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Windows\Microsoft.NET\TextInputHost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4112
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Pictures\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4276
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Public\Pictures\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4128
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Pictures\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3116
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Users\Default\NetHood\Registry.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4720
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\Default\NetHood\Registry.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4988
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Users\Default\NetHood\Registry.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3936
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files\Common Files\RuntimeBroker.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3288
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Common Files\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:776
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Common Files\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3652
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Java\Registry.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3204
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\Java\Registry.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1520
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Java\Registry.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3512
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4228
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:436
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:532
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3300
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4808
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1820
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec31" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3980
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4704
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec31" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:5108
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Program Files\VideoLAN\VLC\Registry.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4028
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\Registry.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1528
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Program Files\VideoLAN\VLC\Registry.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3844
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec31" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3600
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3076
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec31" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:4252
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Windows\System32\bg-BG\spoolsv.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2644
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\bg-BG\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:880
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Windows\System32\bg-BG\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe

    Filesize

    2.7MB

    MD5

    af76e5ca7a620f1c33b5491125afaaec

    SHA1

    cb613e341c067c44955551412d87288ac1a7f83a

    SHA256

    e74498ccefbd509b7b195cc778247ade1ffafb8269e887689534a9247fee2f43

    SHA512

    50452cd7327a6038093387690c8e742a97cf52e5c83966c7d117050e3ddf93c07c134a9c6d609d6be4219d12ea7754da0c83d2a9b32164e82816db1a1ffd9e4b

  • C:\Program Files\Common Files\RuntimeBroker.exe

    Filesize

    2.7MB

    MD5

    fd7c4b1b0da258d11625f794bb94bc20

    SHA1

    0018ef39b1ffc0ed2ad69fbe338c78cd12338d8b

    SHA256

    92685b4ba582aa6e3a14a05614f13366e7b2e5421449375f03cc40c57f949823

    SHA512

    7cc9905eb6e74c0ff43654a15a72d45de70a83fcef4d75c5dd5e5619cf3233ba42260af2a327ac755e4e800351ae19fbb529774c358ae7860911c172c93a084f

  • C:\Program Files\Java\jre-1.8\System.exe

    Filesize

    2.7MB

    MD5

    f9b06779ef8886e3db38dd8edf2c8ae7

    SHA1

    87c11d3f703d6690f5e6aefa5ddabd0eccdb2c43

    SHA256

    13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3

    SHA512

    e7191e615d4fe09136ff49f6e33cc219da7c3421259bc1f648e59e1cfc9c9d93970cb68dd6d8af072ad93867e14d71aa54e41c70d91d31a49b09dbb497d1a5b0

  • C:\Recovery\WindowsRE\RCXE471.tmp

    Filesize

    2.7MB

    MD5

    6d4f98bc176f5f8c7737ed050c87c699

    SHA1

    a2f1cc82691a87c3d64ded7b414591c25d84b9fd

    SHA256

    5ae88f26ae491f53cfa7284c71f1b768aae828e0b3bcd48192dc69921a9b54b7

    SHA512

    89510c28a95f39712e943c66920091fad394d777602c9735c782f5e3c5e593c2e3565a307416de74b7a8291a0b65db3363d07b34e29b046428c5e7970b7ada2b

  • C:\Recovery\WindowsRE\dllhost.exe

    Filesize

    2.7MB

    MD5

    d9c78f8b75cd94ecdf0c3d570a20c10a

    SHA1

    be34f4f41080cf460226dfe64c0364a9aed4b6c6

    SHA256

    e0614d8414bfa48be2e60f56b28ba8beb1bb223fa4312c786e0d290013468300

    SHA512

    13494258228a88107fa5aa764f3ebbefabf50b483d25c9685d52f12f28cebf6cc88ea7c443a712e1f0b4789e0364121b9e8496a26794291df9b13d14380a0052

  • C:\Users\Default\Music\RCXC8E3.tmp

    Filesize

    2.7MB

    MD5

    517f3b5f3a0d7fe45cdd3a481f0adf5e

    SHA1

    c1899cdbb7b8dd0a7501fb3418a46ea16a90b095

    SHA256

    241f3ca50e745d16b297fd3a83adb2b47eca06ca6206f26f7ed8306a148cc825

    SHA512

    de68dc2b143ca0c178ca75defaa0bdcb039664ec962105cb352d4f4bbb65a2c721d155c84d88daf267a4ebc87c1576c8ae08013130d861fc23dc20f90eabe90a

  • C:\Windows\System32\bg-BG\spoolsv.exe

    Filesize

    2.7MB

    MD5

    f99db7ac183cda9862b24a1192d3c5a4

    SHA1

    13917d31bb2139cad53b71b70e8918984031f71d

    SHA256

    7119697e664110c3623152d85692f1d0ed3a99029741f3e292e732410823d905

    SHA512

    a464f9a38fef96fe4c8e29d71855469f3939db15c511cccd654e31086ec8ad844a60e12b41c76b7782a75f59e71444c8cc9655e210fbc859965c2bab53e69134

  • memory/1236-8-0x0000000002950000-0x0000000002966000-memory.dmp

    Filesize

    88KB

  • memory/1236-20-0x000000001B990000-0x000000001B99A000-memory.dmp

    Filesize

    40KB

  • memory/1236-9-0x0000000002820000-0x0000000002828000-memory.dmp

    Filesize

    32KB

  • memory/1236-10-0x0000000002990000-0x000000000299A000-memory.dmp

    Filesize

    40KB

  • memory/1236-11-0x000000001B2E0000-0x000000001B336000-memory.dmp

    Filesize

    344KB

  • memory/1236-12-0x0000000002970000-0x0000000002978000-memory.dmp

    Filesize

    32KB

  • memory/1236-13-0x0000000002980000-0x0000000002992000-memory.dmp

    Filesize

    72KB

  • memory/1236-15-0x000000001B330000-0x000000001B338000-memory.dmp

    Filesize

    32KB

  • memory/1236-16-0x000000001B950000-0x000000001B958000-memory.dmp

    Filesize

    32KB

  • memory/1236-19-0x000000001B980000-0x000000001B98C000-memory.dmp

    Filesize

    48KB

  • memory/1236-18-0x000000001B970000-0x000000001B97E000-memory.dmp

    Filesize

    56KB

  • memory/1236-17-0x000000001B960000-0x000000001B96C000-memory.dmp

    Filesize

    48KB

  • memory/1236-14-0x000000001BE80000-0x000000001C3A8000-memory.dmp

    Filesize

    5.2MB

  • memory/1236-0-0x00007FFD352C3000-0x00007FFD352C5000-memory.dmp

    Filesize

    8KB

  • memory/1236-21-0x000000001B9A0000-0x000000001B9AC000-memory.dmp

    Filesize

    48KB

  • memory/1236-6-0x0000000000EA0000-0x0000000000EA8000-memory.dmp

    Filesize

    32KB

  • memory/1236-7-0x0000000002810000-0x0000000002820000-memory.dmp

    Filesize

    64KB

  • memory/1236-5-0x00000000029A0000-0x00000000029F0000-memory.dmp

    Filesize

    320KB

  • memory/1236-199-0x00007FFD352C3000-0x00007FFD352C5000-memory.dmp

    Filesize

    8KB

  • memory/1236-4-0x00000000027F0000-0x000000000280C000-memory.dmp

    Filesize

    112KB

  • memory/1236-217-0x00007FFD352C0000-0x00007FFD35D81000-memory.dmp

    Filesize

    10.8MB

  • memory/1236-3-0x0000000000E90000-0x0000000000E9E000-memory.dmp

    Filesize

    56KB

  • memory/1236-2-0x00007FFD352C0000-0x00007FFD35D81000-memory.dmp

    Filesize

    10.8MB

  • memory/1236-1-0x0000000000300000-0x00000000005B4000-memory.dmp

    Filesize

    2.7MB

  • memory/1236-345-0x00007FFD352C0000-0x00007FFD35D81000-memory.dmp

    Filesize

    10.8MB

  • memory/3652-344-0x0000000000850000-0x0000000000B04000-memory.dmp

    Filesize

    2.7MB

  • memory/3652-346-0x000000001B690000-0x000000001B6E6000-memory.dmp

    Filesize

    344KB

  • memory/3652-347-0x000000001B850000-0x000000001B862000-memory.dmp

    Filesize

    72KB