Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 02:11
Behavioral task
behavioral1
Sample
13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe
Resource
win10v2004-20241007-en
General
-
Target
13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe
-
Size
2.7MB
-
MD5
f9b06779ef8886e3db38dd8edf2c8ae7
-
SHA1
87c11d3f703d6690f5e6aefa5ddabd0eccdb2c43
-
SHA256
13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3
-
SHA512
e7191e615d4fe09136ff49f6e33cc219da7c3421259bc1f648e59e1cfc9c9d93970cb68dd6d8af072ad93867e14d71aa54e41c70d91d31a49b09dbb497d1a5b0
-
SSDEEP
49152:EGBMeNyllOBdHoYMPRdpOIzP1hu8yPhynpFkn1bkrfWv1LW35IS8CD+isjlQ:BMB7gJUfJ9hcPIpFqtkTWv1w5IgWi
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2660 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1868 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2892 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 696 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1048 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 556 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2140 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1968 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2096 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2956 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3028 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2772 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 680 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2188 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1892 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1612 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2264 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2244 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2016 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2004 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 308 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2124 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1884 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2216 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 832 2600 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 2600 schtasks.exe 30 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe -
resource yara_rule behavioral1/memory/2192-1-0x0000000000E80000-0x0000000001134000-memory.dmp dcrat behavioral1/files/0x0005000000019234-28.dat dcrat behavioral1/files/0x0005000000019cbf-58.dat dcrat behavioral1/files/0x000f000000012029-78.dat dcrat behavioral1/files/0x0007000000019273-127.dat dcrat behavioral1/files/0x000d000000016d46-179.dat dcrat behavioral1/memory/2756-181-0x0000000000250000-0x0000000000504000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2756 spoolsv.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\dwm.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files\Windows Defender\it-IT\RCX73C1.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\RCX7AAA.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\dwm.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Program Files\Windows Defender\it-IT\spoolsv.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\6cb0b6c459d5d3 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files\Windows Defender\it-IT\RCX73C2.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files\Windows Defender\it-IT\spoolsv.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\RCX7B18.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Program Files\Windows Defender\it-IT\f3b6ecef712a24 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe -
Drops file in Windows directory 20 IoCs
description ioc Process File created C:\Windows\PolicyDefinitions\en-US\56085415360792 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\ModemLogs\RCX6FA8.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\PolicyDefinitions\en-US\RCX7633.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\PolicyDefinitions\en-US\wininit.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Windows\ModemLogs\69ddcba757bf72 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\ModemLogs\RCX6FA9.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\ModemLogs\smss.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\PolicyDefinitions\en-US\RCX7634.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\security\RCX7F32.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\security\csrss.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Windows\ModemLogs\smss.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Windows\Globalization\Sorting\spoolsv.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Windows\Globalization\Sorting\f3b6ecef712a24 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Windows\security\csrss.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\Globalization\Sorting\RCX78A6.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\Globalization\Sorting\spoolsv.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\security\RCX7F31.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Windows\PolicyDefinitions\en-US\wininit.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\Globalization\Sorting\RCX7838.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Windows\security\886983d96e3d3e 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2244 schtasks.exe 2216 schtasks.exe 832 schtasks.exe 2660 schtasks.exe 2140 schtasks.exe 2772 schtasks.exe 1892 schtasks.exe 1968 schtasks.exe 3028 schtasks.exe 2872 schtasks.exe 2892 schtasks.exe 1936 schtasks.exe 3032 schtasks.exe 680 schtasks.exe 2016 schtasks.exe 2004 schtasks.exe 1884 schtasks.exe 844 schtasks.exe 696 schtasks.exe 2096 schtasks.exe 1612 schtasks.exe 2264 schtasks.exe 1480 schtasks.exe 556 schtasks.exe 2984 schtasks.exe 3016 schtasks.exe 2240 schtasks.exe 2124 schtasks.exe 1868 schtasks.exe 2956 schtasks.exe 2188 schtasks.exe 1048 schtasks.exe 308 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2192 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 2192 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 2192 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 2192 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 2192 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 2192 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 2192 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 2192 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 2192 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 2756 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2192 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe Token: SeDebugPrivilege 2756 spoolsv.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2756 2192 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 64 PID 2192 wrote to memory of 2756 2192 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 64 PID 2192 wrote to memory of 2756 2192 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 64 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe"C:\Users\Admin\AppData\Local\Temp\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2192 -
C:\Windows\Globalization\Sorting\spoolsv.exe"C:\Windows\Globalization\Sorting\spoolsv.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2756
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Windows\ModemLogs\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\ModemLogs\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Windows\ModemLogs\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\MSOCache\All Users\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender\it-IT\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\it-IT\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\it-IT\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Windows\PolicyDefinitions\en-US\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\en-US\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Windows\PolicyDefinitions\en-US\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Windows\Globalization\Sorting\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Globalization\Sorting\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Windows\Globalization\Sorting\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec31" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3" /sc ONLOGON /tr "'C:\Users\Admin\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec31" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\security\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\security\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Windows\security\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Start Menu\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Users\Default\Start Menu\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Start Menu\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:844
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5517f3b5f3a0d7fe45cdd3a481f0adf5e
SHA1c1899cdbb7b8dd0a7501fb3418a46ea16a90b095
SHA256241f3ca50e745d16b297fd3a83adb2b47eca06ca6206f26f7ed8306a148cc825
SHA512de68dc2b143ca0c178ca75defaa0bdcb039664ec962105cb352d4f4bbb65a2c721d155c84d88daf267a4ebc87c1576c8ae08013130d861fc23dc20f90eabe90a
-
Filesize
2.7MB
MD5617f030b7438ee438d7d7101e5272f8b
SHA1ce554096fef76ebdb17c822c01fd48295df4ba23
SHA2563b7e9bde86443ee88787bd1b74c960835c0036256a7b17830ef8634baf1ad409
SHA51286a5ebcea4c618ec7cad4a70cce5f01c8d50fd8ee60858fe79c8f4cd271b8eb8dc228c14a9fa1e180ddfd16892f6dee444f7eba08af897fddb8043db86bffd34
-
Filesize
2.7MB
MD5480c4aeaa9293f2900365303f5718c24
SHA16011f81eb3a11c8e4b7768caed043bd6c8f268aa
SHA256beb1011d718bfd4d6a3af488cbaf7931d9600821f1adb2608a24bf08aac9086f
SHA5128d8d0d5ed15de991694e59991d94bcb2d5e7beeddbfa0dcf5932f8cd14e48726becd23d7038f172c257e837737167efeeb6bdf5a86564fea5a743c2066442b02
-
Filesize
2.7MB
MD5ab1620495ffb592580f0617904487ccc
SHA1fe6491e369d90c0378e183eabc6c9d2b91852497
SHA2568f591226f2ce00c6800f06e3142cda0f4c88d079c018f01f41094fc1a12e3c01
SHA512cca501d1ed5a2bdfb421a4f757821c540632f135b53bbfb8bedf23ff3e0acfa5c497346e0bcb30bc71a46db45c91fd31c74ca5cee145149f64e2e4ef078168d9
-
Filesize
2.7MB
MD5f9b06779ef8886e3db38dd8edf2c8ae7
SHA187c11d3f703d6690f5e6aefa5ddabd0eccdb2c43
SHA25613f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3
SHA512e7191e615d4fe09136ff49f6e33cc219da7c3421259bc1f648e59e1cfc9c9d93970cb68dd6d8af072ad93867e14d71aa54e41c70d91d31a49b09dbb497d1a5b0