Analysis
-
max time kernel
91s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 02:11
Behavioral task
behavioral1
Sample
13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe
Resource
win10v2004-20241007-en
General
-
Target
13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe
-
Size
2.7MB
-
MD5
f9b06779ef8886e3db38dd8edf2c8ae7
-
SHA1
87c11d3f703d6690f5e6aefa5ddabd0eccdb2c43
-
SHA256
13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3
-
SHA512
e7191e615d4fe09136ff49f6e33cc219da7c3421259bc1f648e59e1cfc9c9d93970cb68dd6d8af072ad93867e14d71aa54e41c70d91d31a49b09dbb497d1a5b0
-
SSDEEP
49152:EGBMeNyllOBdHoYMPRdpOIzP1hu8yPhynpFkn1bkrfWv1LW35IS8CD+isjlQ:BMB7gJUfJ9hcPIpFqtkTWv1w5IgWi
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 27 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3632 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1896 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3772 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4936 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3120 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1068 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1248 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 840 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3220 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1408 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4688 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3624 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4612 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4768 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5116 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4484 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3544 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2480 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2448 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1232 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4540 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 1872 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4168 1872 schtasks.exe 83 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe -
resource yara_rule behavioral2/memory/4316-1-0x0000000000920000-0x0000000000BD4000-memory.dmp dcrat behavioral2/files/0x0007000000023cc3-30.dat dcrat behavioral2/files/0x0007000000023cd6-65.dat dcrat behavioral2/files/0x000500000001e762-91.dat dcrat behavioral2/files/0x0008000000023cd6-136.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe -
Executes dropped EXE 1 IoCs
pid Process 4284 dllhost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Mail\TextInputHost.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\22eafd247d37c3 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files\MSBuild\Microsoft\RCXE3DF.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files\MSBuild\Microsoft\StartMenuExperienceHost.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\RCXEB75.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Program Files\MSBuild\Microsoft\55b276f4edf653 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\27d1bcfc3c54e0 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files\MSBuild\Microsoft\RCXE3CE.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\TextInputHost.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\System.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RCXF08A.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Program Files\MSBuild\Microsoft\StartMenuExperienceHost.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\System.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\TextInputHost.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files\Windows Mail\RCXDF94.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\RCXEB76.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Program Files\Windows Mail\TextInputHost.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Program Files\Windows Mail\22eafd247d37c3 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files\Windows Mail\RCXDFA5.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RCXF108.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\es-ES\dllhost.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\schemas\AvailableNetwork\RCXE961.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\schemas\AvailableNetwork\TextInputHost.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\es-ES\RCXF30D.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\es-ES\RCXF30E.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\es-ES\dllhost.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Windows\schemas\AvailableNetwork\22eafd247d37c3 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Windows\schemas\AvailableNetwork\TextInputHost.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Windows\CSC\SppExtComObj.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Windows\es-ES\5940a34987c991 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File opened for modification C:\Windows\schemas\AvailableNetwork\RCXE912.tmp 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe File created C:\Windows\Boot\backgroundTaskHost.exe 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3120 schtasks.exe 840 schtasks.exe 4768 schtasks.exe 4484 schtasks.exe 4540 schtasks.exe 1724 schtasks.exe 1248 schtasks.exe 3220 schtasks.exe 1408 schtasks.exe 4688 schtasks.exe 3632 schtasks.exe 1068 schtasks.exe 3544 schtasks.exe 2480 schtasks.exe 4168 schtasks.exe 2448 schtasks.exe 1660 schtasks.exe 3624 schtasks.exe 5116 schtasks.exe 2036 schtasks.exe 4612 schtasks.exe 1232 schtasks.exe 2984 schtasks.exe 3772 schtasks.exe 1804 schtasks.exe 1896 schtasks.exe 4936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4316 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 4316 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 4316 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 4316 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 4316 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 4316 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 4316 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 4284 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4316 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe Token: SeDebugPrivilege 4284 dllhost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4316 wrote to memory of 4416 4316 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 114 PID 4316 wrote to memory of 4416 4316 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe 114 PID 4416 wrote to memory of 1716 4416 cmd.exe 116 PID 4416 wrote to memory of 1716 4416 cmd.exe 116 PID 4416 wrote to memory of 4284 4416 cmd.exe 123 PID 4416 wrote to memory of 4284 4416 cmd.exe 123 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe"C:\Users\Admin\AppData\Local\Temp\13f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4316 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xb3wPgb0HP.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1716
-
-
C:\Windows\es-ES\dllhost.exe"C:\Windows\es-ES\dllhost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4284
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Mail\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Mail\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Admin\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 9 /tr "'C:\Program Files\MSBuild\Microsoft\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 10 /tr "'C:\Program Files\MSBuild\Microsoft\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Windows\schemas\AvailableNetwork\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\schemas\AvailableNetwork\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Windows\schemas\AvailableNetwork\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Windows\es-ES\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\es-ES\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Windows\es-ES\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4168
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5d2cf64c2192246aa1eb66d831acdc208
SHA113bb60d89c0eb79bcf1f5cae5efcc33ef0064e25
SHA256ca9056de1175084896de312a55de321773761ca5f2d433ba98e68be8f7c033c2
SHA512273cd31173653d1b7b018ecb8eed8f14a2352a9ee659ed998f6255cebd4566558f3b7e04870bb41b7103e7f5029ae7acadd73ff8f6437b2ae136fc640a63b37b
-
Filesize
2.7MB
MD5bd2721b972def4f722069f9086f1cfb5
SHA1756fc9a2c536ea04a41f6f3469ce48c033a9ca43
SHA2565a38953b4386c0fbf68e259498e76cda3ec94ba0a549b63aab9acbe8398a6080
SHA5122474aa7ef01667e5b6159a92e935c05e7b5f02cf638e515e159d153ea93445ae778ea8580168d809739a47051fd2b10f550b67f4a6976357bd7debad67c01043
-
Filesize
193B
MD5a16a5a4ac01ab66d2c74e9118b35f383
SHA1198d406b2548cca4f2a5684e118069ab692fca92
SHA25613c4f3f41390c6bb7cdcdb5f743749441993a100d6d1dc05f4114dd3a8baea90
SHA5122dc66603d0b391fe3a05bfc63f693657791495f0be8afbca5a86380dd7f47d3d5f4fba087cca271220f9c3fdfa58866ffa19948dcc0cd7005b3d40e80d5333a9
-
Filesize
2.7MB
MD5517f3b5f3a0d7fe45cdd3a481f0adf5e
SHA1c1899cdbb7b8dd0a7501fb3418a46ea16a90b095
SHA256241f3ca50e745d16b297fd3a83adb2b47eca06ca6206f26f7ed8306a148cc825
SHA512de68dc2b143ca0c178ca75defaa0bdcb039664ec962105cb352d4f4bbb65a2c721d155c84d88daf267a4ebc87c1576c8ae08013130d861fc23dc20f90eabe90a
-
Filesize
2.7MB
MD5f9b06779ef8886e3db38dd8edf2c8ae7
SHA187c11d3f703d6690f5e6aefa5ddabd0eccdb2c43
SHA25613f24a33b0bda605948ee337aac9f7095faeb536a0c1ba8d221a53af3822eec3
SHA512e7191e615d4fe09136ff49f6e33cc219da7c3421259bc1f648e59e1cfc9c9d93970cb68dd6d8af072ad93867e14d71aa54e41c70d91d31a49b09dbb497d1a5b0