Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 04:34
Behavioral task
behavioral1
Sample
76e7d1b53c84ccbf7789386bdeffc58d4171f2fbfa650891e980ccc6f77789ba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
76e7d1b53c84ccbf7789386bdeffc58d4171f2fbfa650891e980ccc6f77789ba.exe
Resource
win10v2004-20241007-en
General
-
Target
76e7d1b53c84ccbf7789386bdeffc58d4171f2fbfa650891e980ccc6f77789ba.exe
-
Size
1.1MB
-
MD5
f6ce84a3177d88fd779e990ecd08c5b3
-
SHA1
421a718c107138941a908abc5a5ec608f2ff1121
-
SHA256
76e7d1b53c84ccbf7789386bdeffc58d4171f2fbfa650891e980ccc6f77789ba
-
SHA512
f3a721633d9e4d5c0376ebf638e05d454ebd6f75d2cdd842e173c9dc2b1568f686a96ef4d737426dc56ffafe4e28fd56abffa29986c375834b5a4348bcde6770
-
SSDEEP
24576:U2G/nvxW3Ww0tqNUI8y/hByvMnRxzbL6mcYUJV2Vzl:UbA30MF/hRwfMx
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3068 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1420 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1256 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2268 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1580 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1880 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1928 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 868 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 680 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1240 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 532 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 296 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1716 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2404 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2196 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2188 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1584 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 444 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1460 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2412 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1556 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 288 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 716 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 924 1668 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2280 1668 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x00080000000174bf-9.dat dcrat behavioral1/memory/2564-13-0x0000000000C80000-0x0000000000D56000-memory.dmp dcrat behavioral1/memory/1984-43-0x00000000002B0000-0x0000000000386000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2564 agentWinmonitor.exe 1984 wininit.exe -
Loads dropped DLL 2 IoCs
pid Process 2600 cmd.exe 2600 cmd.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Office14\1033\886983d96e3d3e agentWinmonitor.exe File created C:\Program Files\Windows NT\smss.exe agentWinmonitor.exe File created C:\Program Files\Windows NT\69ddcba757bf72 agentWinmonitor.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\dwm.exe agentWinmonitor.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\6cb0b6c459d5d3 agentWinmonitor.exe File created C:\Program Files (x86)\Windows Media Player\conhost.exe agentWinmonitor.exe File created C:\Program Files (x86)\Windows Media Player\088424020bedd6 agentWinmonitor.exe File created C:\Program Files\Microsoft Office\Office14\1033\csrss.exe agentWinmonitor.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v4.0.30319_32\7a0fd90576e088 agentWinmonitor.exe File created C:\Windows\Boot\DVD\PCAT\it-IT\agentWinmonitor.exe agentWinmonitor.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\explorer.exe agentWinmonitor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76e7d1b53c84ccbf7789386bdeffc58d4171f2fbfa650891e980ccc6f77789ba.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1492 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1240 schtasks.exe 2196 schtasks.exe 1556 schtasks.exe 2940 schtasks.exe 2384 schtasks.exe 1256 schtasks.exe 1584 schtasks.exe 924 schtasks.exe 868 schtasks.exe 2112 schtasks.exe 444 schtasks.exe 1460 schtasks.exe 1420 schtasks.exe 2604 schtasks.exe 296 schtasks.exe 1716 schtasks.exe 2404 schtasks.exe 2188 schtasks.exe 1948 schtasks.exe 1880 schtasks.exe 1928 schtasks.exe 532 schtasks.exe 2240 schtasks.exe 2088 schtasks.exe 288 schtasks.exe 2280 schtasks.exe 680 schtasks.exe 2432 schtasks.exe 3068 schtasks.exe 1580 schtasks.exe 2268 schtasks.exe 2412 schtasks.exe 716 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2564 agentWinmonitor.exe 2564 agentWinmonitor.exe 2564 agentWinmonitor.exe 1984 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2564 agentWinmonitor.exe Token: SeDebugPrivilege 1984 wininit.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2784 2884 76e7d1b53c84ccbf7789386bdeffc58d4171f2fbfa650891e980ccc6f77789ba.exe 30 PID 2884 wrote to memory of 2784 2884 76e7d1b53c84ccbf7789386bdeffc58d4171f2fbfa650891e980ccc6f77789ba.exe 30 PID 2884 wrote to memory of 2784 2884 76e7d1b53c84ccbf7789386bdeffc58d4171f2fbfa650891e980ccc6f77789ba.exe 30 PID 2884 wrote to memory of 2784 2884 76e7d1b53c84ccbf7789386bdeffc58d4171f2fbfa650891e980ccc6f77789ba.exe 30 PID 2784 wrote to memory of 2600 2784 WScript.exe 31 PID 2784 wrote to memory of 2600 2784 WScript.exe 31 PID 2784 wrote to memory of 2600 2784 WScript.exe 31 PID 2784 wrote to memory of 2600 2784 WScript.exe 31 PID 2600 wrote to memory of 2564 2600 cmd.exe 33 PID 2600 wrote to memory of 2564 2600 cmd.exe 33 PID 2600 wrote to memory of 2564 2600 cmd.exe 33 PID 2600 wrote to memory of 2564 2600 cmd.exe 33 PID 2564 wrote to memory of 1728 2564 agentWinmonitor.exe 68 PID 2564 wrote to memory of 1728 2564 agentWinmonitor.exe 68 PID 2564 wrote to memory of 1728 2564 agentWinmonitor.exe 68 PID 2600 wrote to memory of 1492 2600 cmd.exe 70 PID 2600 wrote to memory of 1492 2600 cmd.exe 70 PID 2600 wrote to memory of 1492 2600 cmd.exe 70 PID 2600 wrote to memory of 1492 2600 cmd.exe 70 PID 1728 wrote to memory of 1032 1728 cmd.exe 71 PID 1728 wrote to memory of 1032 1728 cmd.exe 71 PID 1728 wrote to memory of 1032 1728 cmd.exe 71 PID 1728 wrote to memory of 1984 1728 cmd.exe 72 PID 1728 wrote to memory of 1984 1728 cmd.exe 72 PID 1728 wrote to memory of 1984 1728 cmd.exe 72 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\76e7d1b53c84ccbf7789386bdeffc58d4171f2fbfa650891e980ccc6f77789ba.exe"C:\Users\Admin\AppData\Local\Temp\76e7d1b53c84ccbf7789386bdeffc58d4171f2fbfa650891e980ccc6f77789ba.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Serverwin\EW0p41ez0N7HYRg6N6rv6D.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Serverwin\XWK21vbuz3pBmIIr863tMg.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Serverwin\agentWinmonitor.exe"C:\Serverwin\agentWinmonitor.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kVsAf2Rv5l.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1032
-
-
C:\Users\All Users\Favorites\wininit.exe"C:\Users\All Users\Favorites\wininit.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1492
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Favorites\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\All Users\Favorites\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Favorites\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Windows\assembly\NativeImages_v4.0.30319_32\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\assembly\NativeImages_v4.0.30319_32\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Windows\assembly\NativeImages_v4.0.30319_32\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Media Player\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Media Player\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Application Data\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Application Data\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Application Data\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office\Office14\1033\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\1033\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Microsoft Office\Office14\1033\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows NT\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows NT\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209B
MD5541275260b9ec67c8537c0edad28f1b9
SHA19af23fbfc493604daaccd331efec05ebfc1e64e5
SHA256a32684fc6fdea338d4c29bd0cac3e4dca8afb3f896a009096272cb8a32b3a51e
SHA51247dae81d53a7c1b091eb5cab7d627811fbd7319709f7c22b4e50b628beeb269f3de36f77c7206873b1eea43ef7c665c579230f17ccfd4ca32807d2d65c1c1384
-
Filesize
146B
MD5911702a577938eef8bbc1ce89e6d1bc8
SHA1d7470178892e21f9c5fbc58876bda7ce5741f924
SHA25696f145902bda9186af668c933108ce68dc3d8bba717823cade826dfde518d1bf
SHA512683aeb4f6efb24501e64ca3cbf2734a65dd1fe9672787e472ba04304cff7698c295bdf22f59bdc62295bea5dab3d0f3ae8a6cbdd6fd70daaf6e797405173b274
-
Filesize
205B
MD549541fcfc3b2b8ffb253bebf2a7c6400
SHA1d4d0bc2e4618b9eae5f50f337cc290a011d1ddf6
SHA2565bad1c01fc8d81d06306af2c80cf0160f07ffa8d07904a29aff49e4398387f46
SHA512babab1135749a2676438651860873fadd1129c504ef93346b290bc5f4b2b42e19f5a4718610a0b1c5ff53597bb5e2174c918735398a031879ea07bcf6017947f
-
Filesize
828KB
MD551c9ce115354b8ac4e71e8da3f224ff4
SHA171b3ce67ad3d5467e58971a3ec197d4a725669bd
SHA256e4a087a2892f543978031a40e332b829763a7a71b7d641e87fbd137958648e2d
SHA5127636e523a8e7938dddfab02c96a5296e4ce337ebcc5d7595ea711429eae1330db46c22d9a4352c524c2b2d099ac2f27d7d96768a577a39e82a654ac980657406