Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2025 03:30

General

  • Target

    77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845.exe

  • Size

    2.2MB

  • MD5

    4456822b2b827ac37495bd31b427a67a

  • SHA1

    201a118a38334aa4d971753dee890f2d15777c46

  • SHA256

    77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845

  • SHA512

    cb1e84f52bc25984422981e6c3b76ad2c3eebe895434a677ebdac9a676eeb4c46b1e1aed43161e4a3c4ba0a16da764d8f3b5d5823cb99f2d934738f1478e4213

  • SSDEEP

    49152:631tZUmbFNH1wLJDPqTo9lIS/MXU2F4/1l5eQ7K6:6ltZUE6NDyTo9lv2F+VvK6

Malware Config

Signatures

  • DcRat 52 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 17 IoCs
  • Process spawned unexpected child process 51 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 9 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 34 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Drops file in Windows directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845.exe
    "C:\Users\Admin\AppData\Local\Temp\77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845.exe"
    1⤵
    • DcRat
    • Modifies WinLogon for persistence
    • UAC bypass
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2276
    • C:\Program Files\Windows Defender\fr-FR\taskhost.exe
      "C:\Program Files\Windows Defender\fr-FR\taskhost.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2524
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\125e04f7-9864-4fad-bed4-98cf772d581f.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2856
        • C:\Program Files\Windows Defender\fr-FR\taskhost.exe
          "C:\Program Files\Windows Defender\fr-FR\taskhost.exe"
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1900
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\36db530b-c0e6-433e-8dc3-7b76c06a30ac.vbs"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2572
            • C:\Program Files\Windows Defender\fr-FR\taskhost.exe
              "C:\Program Files\Windows Defender\fr-FR\taskhost.exe"
              6⤵
              • UAC bypass
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:2784
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\32bb90f2-ec93-4c5d-ae20-d8cedd625077.vbs"
                7⤵
                  PID:3048
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6d241d55-9de3-48e9-9f8e-5840ce8ce58e.vbs"
                  7⤵
                    PID:1508
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\05770b91-aba4-4af8-a897-e43605ad62b7.vbs"
                5⤵
                  PID:2724
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b06cc6d9-d85d-43a4-9c4d-ff2291551dec.vbs"
              3⤵
                PID:1488
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Users\Default\sppsvc.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2636
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2548
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Users\Default\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2660
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff92568457" /sc MINUTE /mo 12 /tr "'C:\Users\Default\AppData\Roaming\Media Center Programs\77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2608
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845" /sc ONLOGON /tr "'C:\Users\Default\AppData\Roaming\Media Center Programs\77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2560
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff92568457" /sc MINUTE /mo 10 /tr "'C:\Users\Default\AppData\Roaming\Media Center Programs\77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2932
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Windows\ja-JP\dllhost.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2616
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\ja-JP\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2700
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Windows\ja-JP\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2816
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\explorer.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2624
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\explorer.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1700
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\explorer.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1928
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff92568457" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2532
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2212
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff92568457" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1616
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Windows\PLA\Rules\Idle.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1596
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\PLA\Rules\Idle.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:264
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Windows\PLA\Rules\Idle.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2524
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\services.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1636
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\services.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2516
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\services.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1716
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\dllhost.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1764
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2740
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2024
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Users\Public\taskhost.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1804
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\Public\taskhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1760
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Users\Public\taskhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:548
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\taskhost.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2796
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\taskhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2764
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\taskhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3012
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\audiodg.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2900
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\audiodg.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3016
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\audiodg.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2892
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\Idle.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2544
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\Idle.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1252
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\Idle.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1120
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\spoolsv.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1092
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\spoolsv.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1464
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\spoolsv.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2184
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender\fr-FR\taskhost.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:604
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\fr-FR\taskhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3004
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender\fr-FR\taskhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1360
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\csrss.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1132
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\csrss.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1752
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\csrss.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:692
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Sidebar\en-US\sppsvc.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2336
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\en-US\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2956
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\en-US\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2132
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\dllhost.exe'" /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2068
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2552
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • DcRat
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1592

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\MSOCache\All Users\dllhost.exe

            Filesize

            2.2MB

            MD5

            58d1a75b8336635c1e13048b9ff06dad

            SHA1

            7d45c7a1c562e5bf26d9ef809014b160afa76bde

            SHA256

            c8b637bc1e8ae170efcf117268973027147d829e66e062dbb40ffa2c66f91ae7

            SHA512

            3d0e56e1c655e3222b6921bcb380d39f2129a363ff67dc53a883b194a912bd2b18b314b9771e8f00bc7ca1191c423b488e866ca01073f429b6466320557f4f0d

          • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845.exe

            Filesize

            2.2MB

            MD5

            4456822b2b827ac37495bd31b427a67a

            SHA1

            201a118a38334aa4d971753dee890f2d15777c46

            SHA256

            77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845

            SHA512

            cb1e84f52bc25984422981e6c3b76ad2c3eebe895434a677ebdac9a676eeb4c46b1e1aed43161e4a3c4ba0a16da764d8f3b5d5823cb99f2d934738f1478e4213

          • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\dllhost.exe

            Filesize

            2.2MB

            MD5

            c9f3618ba1b3e943f929d73ea502b282

            SHA1

            26f5e01544841c09b4361fc3c953ab85d3254f7b

            SHA256

            5f1d3ef89a763b3918cec1d3ddfa8df5c97ad9c9ef2425a62475aa62d25a3129

            SHA512

            f08ec879a30be7e18915cff7d14ae35913016d16cf8703dd11311a17aa1688c746c30c84546cceaa3669f7f0e0c07727d52c79067b379572471e67b195984b4b

          • C:\Users\Admin\AppData\Local\Temp\125e04f7-9864-4fad-bed4-98cf772d581f.vbs

            Filesize

            728B

            MD5

            9cb6ea20f97a4fa826f7bad548471693

            SHA1

            98a6edfe28d901f2b549fb4bd42e2d0528601872

            SHA256

            e1497e260c273e1b533bd7de1f8cba1fef634909cb1db30e25b83e8d4492a430

            SHA512

            8325dc7bc94850dc2733350ccd9a0779c11508c1e07d3c1791beb52babb7514b5276e5ca1c53712bf0f7efbc6ecc2a55c3d2aeb759123f79ed1265f76b3edcc9

          • C:\Users\Admin\AppData\Local\Temp\32bb90f2-ec93-4c5d-ae20-d8cedd625077.vbs

            Filesize

            728B

            MD5

            b5bc6c625641b2cc6f15f63f529e7b94

            SHA1

            7ccb3cbc7d1eb7f6bcdb9487e2528a5d7c5612ff

            SHA256

            0a46e94f2cc4e1d08a5fff1be378f4cefacb82a81edda4b44aa5d07e68d69417

            SHA512

            ef95cdab8069c9f174e94a66d6b26bac0ff521501b93c3a25b122c52babd32e7d251867ae504f21840878a8b72b040c72e9cb16319c33426167c33243985baae

          • C:\Users\Admin\AppData\Local\Temp\36db530b-c0e6-433e-8dc3-7b76c06a30ac.vbs

            Filesize

            728B

            MD5

            753aa7f3e57bb7dde89d730eef534ae6

            SHA1

            7610b8e13819ad0efa146829c33997ec9adb48ca

            SHA256

            69ce9d3c4bb8c7afeb75282c3d43271bd8ee1be3921768081c9dfde3767bdcad

            SHA512

            645d55d1daf8e9cb48473fdc56a827e0375a619717184abb480c85ffe858212926543be4c22cb2d64863a981ee21b32e50acacbdd0d11f3a368bdcf1a884106f

          • C:\Users\Admin\AppData\Local\Temp\b06cc6d9-d85d-43a4-9c4d-ff2291551dec.vbs

            Filesize

            504B

            MD5

            ce24cc15a70fd88d0be0b1c4e707c149

            SHA1

            95c2d03571975803d726625cbaa37ac94bb8ccb6

            SHA256

            17d3fc2232a701a1e2763bc6761b3d7913c26a58f9e0cb382a4de4e898f15b7b

            SHA512

            c469e533603b5d42515759b437767e6f12fea2626efa97a2fe134601502915cd25d97249637092e4a5995ee91463e5a5123bc944de0acd3d836635bbe51f3a67

          • C:\Users\Public\taskhost.exe

            Filesize

            2.2MB

            MD5

            9259d969ba826b30a8b09a22e2d4c045

            SHA1

            9050d1494fa5de023a40d27ed77594992ca4f9f0

            SHA256

            cb1f06d166bacec4295470a03fd6a5c394ad89d9d2217a3c64c07a6db181f75b

            SHA512

            b188352148bb5b54d2ae320d9b365a74e702c275e559a0c2c29f5569f3c247ef32abef3bcb3a0618e1536d94ddd6378bf61613e9051b929d40326ee2d4e75859

          • C:\Windows\BitLockerDiscoveryVolumeContents\taskhost.exe

            Filesize

            2.2MB

            MD5

            80794eff35bb7052662c57c6ffbce4d7

            SHA1

            d425066c5e2d73c1e8d41e2d38138529017b139d

            SHA256

            20f1180f8173dc27729882c0360b26adc4b58fadba6ec2d7a05014415e9f7407

            SHA512

            56485ec3fffc2c8684eba81c0ef90c9e7332408b84f628bb17b056c3f779dfae23c1973cace8056c7a96c3662a83573cd16160c817d2f11294a56d4bca5b9d78

          • memory/1900-289-0x0000000001060000-0x000000000128E000-memory.dmp

            Filesize

            2.2MB

          • memory/2276-23-0x0000000001090000-0x000000000109E000-memory.dmp

            Filesize

            56KB

          • memory/2276-28-0x00000000010E0000-0x00000000010EC000-memory.dmp

            Filesize

            48KB

          • memory/2276-12-0x0000000000C20000-0x0000000000C2A000-memory.dmp

            Filesize

            40KB

          • memory/2276-13-0x0000000000C30000-0x0000000000C3C000-memory.dmp

            Filesize

            48KB

          • memory/2276-14-0x0000000000D50000-0x0000000000D58000-memory.dmp

            Filesize

            32KB

          • memory/2276-15-0x0000000000F00000-0x0000000000F0C000-memory.dmp

            Filesize

            48KB

          • memory/2276-16-0x0000000000F10000-0x0000000000F18000-memory.dmp

            Filesize

            32KB

          • memory/2276-18-0x0000000000F20000-0x0000000000F32000-memory.dmp

            Filesize

            72KB

          • memory/2276-19-0x0000000000F50000-0x0000000000F5C000-memory.dmp

            Filesize

            48KB

          • memory/2276-20-0x0000000000F60000-0x0000000000F6C000-memory.dmp

            Filesize

            48KB

          • memory/2276-21-0x0000000000F70000-0x0000000000F7C000-memory.dmp

            Filesize

            48KB

          • memory/2276-22-0x0000000001080000-0x000000000108A000-memory.dmp

            Filesize

            40KB

          • memory/2276-0-0x000007FEF5973000-0x000007FEF5974000-memory.dmp

            Filesize

            4KB

          • memory/2276-24-0x00000000010A0000-0x00000000010A8000-memory.dmp

            Filesize

            32KB

          • memory/2276-25-0x00000000010B0000-0x00000000010BE000-memory.dmp

            Filesize

            56KB

          • memory/2276-26-0x00000000010C0000-0x00000000010CC000-memory.dmp

            Filesize

            48KB

          • memory/2276-27-0x00000000010D0000-0x00000000010D8000-memory.dmp

            Filesize

            32KB

          • memory/2276-11-0x0000000000C40000-0x0000000000C50000-memory.dmp

            Filesize

            64KB

          • memory/2276-29-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

            Filesize

            9.9MB

          • memory/2276-10-0x0000000000C10000-0x0000000000C18000-memory.dmp

            Filesize

            32KB

          • memory/2276-9-0x0000000000B80000-0x0000000000B8C000-memory.dmp

            Filesize

            48KB

          • memory/2276-8-0x0000000000B60000-0x0000000000B76000-memory.dmp

            Filesize

            88KB

          • memory/2276-7-0x0000000000B50000-0x0000000000B60000-memory.dmp

            Filesize

            64KB

          • memory/2276-210-0x000007FEF5973000-0x000007FEF5974000-memory.dmp

            Filesize

            4KB

          • memory/2276-235-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

            Filesize

            9.9MB

          • memory/2276-258-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

            Filesize

            9.9MB

          • memory/2276-6-0x0000000000500000-0x0000000000508000-memory.dmp

            Filesize

            32KB

          • memory/2276-278-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

            Filesize

            9.9MB

          • memory/2276-1-0x0000000001150000-0x000000000137E000-memory.dmp

            Filesize

            2.2MB

          • memory/2276-5-0x00000000004E0000-0x00000000004FC000-memory.dmp

            Filesize

            112KB

          • memory/2276-4-0x00000000004D0000-0x00000000004DE000-memory.dmp

            Filesize

            56KB

          • memory/2276-3-0x0000000000430000-0x000000000043E000-memory.dmp

            Filesize

            56KB

          • memory/2276-2-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

            Filesize

            9.9MB

          • memory/2524-277-0x0000000000800000-0x0000000000A2E000-memory.dmp

            Filesize

            2.2MB

          • memory/2784-301-0x0000000000330000-0x000000000055E000-memory.dmp

            Filesize

            2.2MB