Analysis
-
max time kernel
47s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 02:11
Behavioral task
behavioral1
Sample
2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe
Resource
win10v2004-20241007-en
General
-
Target
2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe
-
Size
315KB
-
MD5
ec9c92645e4178fda49d0a3aecd70b39
-
SHA1
ec0c8e353318c041da25c11c4d9cc593519137d8
-
SHA256
2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772
-
SHA512
d96c7dfba3094507bd4e9d4ee23ae08c221f011131b2ba7ffa3b97edc0934e4056ebdb6623171bc9b52d77ddd9e34e265ea953cd1547b3c83703aece766c9a8f
-
SSDEEP
6144:2dsy2oo7KrfynB80ZhrabrFyA/5Txe0M/Lmld4pQdxTbkr9u:2P2N7KKS0ZXA/HF06dx8Z
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2848 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2756 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2916 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2668 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1092 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2292 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2260 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1608 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1820 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1556 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2704 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 792 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2052 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2204 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 500 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 876 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2556 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2428 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 2188 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 904 2188 schtasks.exe 29 -
resource yara_rule behavioral1/memory/640-1-0x0000000000850000-0x00000000008A6000-memory.dmp dcrat behavioral1/files/0x000500000001a307-11.dat dcrat behavioral1/memory/1940-33-0x00000000010D0000-0x0000000001126000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 1940 smss.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\fr-FR\69ddcba757bf72 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\spoolsv.exe 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\f3b6ecef712a24 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\dllhost.exe 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\5940a34987c991 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File created C:\Program Files (x86)\Microsoft.NET\spoolsv.exe 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File created C:\Program Files (x86)\Internet Explorer\fr-FR\smss.exe 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File opened for modification C:\Program Files (x86)\Internet Explorer\fr-FR\smss.exe 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File created C:\Program Files\7-Zip\explorer.exe 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File created C:\Program Files (x86)\Microsoft.NET\f3b6ecef712a24 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File created C:\Program Files\7-Zip\7a0fd90576e088 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\csrss.exe 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\886983d96e3d3e 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\diagnostics\scheduled\Maintenance\de-DE\dwm.exe 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File created C:\Windows\Fonts\2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe File created C:\Windows\Fonts\5f41a45d991bbd 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2848 schtasks.exe 1820 schtasks.exe 2884 schtasks.exe 2916 schtasks.exe 2668 schtasks.exe 1092 schtasks.exe 1556 schtasks.exe 1804 schtasks.exe 2028 schtasks.exe 2428 schtasks.exe 904 schtasks.exe 2556 schtasks.exe 1616 schtasks.exe 2292 schtasks.exe 2372 schtasks.exe 1676 schtasks.exe 3004 schtasks.exe 500 schtasks.exe 2036 schtasks.exe 2756 schtasks.exe 2736 schtasks.exe 2844 schtasks.exe 2104 schtasks.exe 1780 schtasks.exe 2260 schtasks.exe 2704 schtasks.exe 2604 schtasks.exe 2620 schtasks.exe 1608 schtasks.exe 792 schtasks.exe 2976 schtasks.exe 1932 schtasks.exe 844 schtasks.exe 2052 schtasks.exe 2204 schtasks.exe 876 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 640 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe 640 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe 640 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe 640 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe 640 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe 1940 smss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 640 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe Token: SeDebugPrivilege 1940 smss.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 640 wrote to memory of 1940 640 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe 66 PID 640 wrote to memory of 1940 640 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe 66 PID 640 wrote to memory of 1940 640 2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe 66 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe"C:\Users\Admin\AppData\Local\Temp\2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Program Files (x86)\Internet Explorer\fr-FR\smss.exe"C:\Program Files (x86)\Internet Explorer\fr-FR\smss.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Internet Explorer\fr-FR\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\fr-FR\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Internet Explorer\fr-FR\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Media Player\it-IT\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\it-IT\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Media Player\it-IT\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b7722" /sc MINUTE /mo 14 /tr "'C:\Windows\Fonts\2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772" /sc ONLOGON /tr "'C:\Windows\Fonts\2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b7722" /sc MINUTE /mo 9 /tr "'C:\Windows\Fonts\2c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft.NET\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft.NET\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files\7-Zip\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\7-Zip\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Program Files\7-Zip\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Users\Default\My Documents\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\My Documents\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Users\Default\My Documents\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315KB
MD5ec9c92645e4178fda49d0a3aecd70b39
SHA1ec0c8e353318c041da25c11c4d9cc593519137d8
SHA2562c1c9222242148483befec88bb981d11b1736abe489f0005bd3a3d921329b772
SHA512d96c7dfba3094507bd4e9d4ee23ae08c221f011131b2ba7ffa3b97edc0934e4056ebdb6623171bc9b52d77ddd9e34e265ea953cd1547b3c83703aece766c9a8f