Analysis
-
max time kernel
119s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23/01/2025, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
Nixware.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Nixware.exe
Resource
win10v2004-20241007-en
General
-
Target
Nixware.exe
-
Size
2.7MB
-
MD5
d07543cb1bc6f660adcb7107ab33f270
-
SHA1
8421ed19516a2152e4a53d694179107f3ef585c0
-
SHA256
be08dac8fc827b41b19be240140f13e19a802e6c6108105cc303a873c57a20c4
-
SHA512
03b6e377af1022d298aeac70c779b621cb5c0e636874e7739fa7ad30b1d64a08a16429719f89dcd0122f8b7309b20708672f8da32577e0265c3c8b34bae2add0
-
SSDEEP
49152:GB7nRsoz7nIZgHltNj/VImvhIudDXtNHUxQ:Y7nq27nIENjqihIerHUxQ
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatesession\\explorer.exe\", \"C:\\Windows\\Tasks\\System.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\SIGNUP\\Idle.exe\", \"C:\\Recovery\\31f19e42-8726-11ef-be9a-dab21757c799\\BlockPortdriverCommon.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\System.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatesession\\explorer.exe\", \"C:\\Windows\\Tasks\\System.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\SIGNUP\\Idle.exe\", \"C:\\Recovery\\31f19e42-8726-11ef-be9a-dab21757c799\\BlockPortdriverCommon.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\surrogatesession\\BlockPortdriverCommon.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatesession\\explorer.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatesession\\explorer.exe\", \"C:\\Windows\\Tasks\\System.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatesession\\explorer.exe\", \"C:\\Windows\\Tasks\\System.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\SIGNUP\\Idle.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatesession\\explorer.exe\", \"C:\\Windows\\Tasks\\System.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\SIGNUP\\Idle.exe\", \"C:\\Recovery\\31f19e42-8726-11ef-be9a-dab21757c799\\BlockPortdriverCommon.exe\"" BlockPortdriverCommon.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1768 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 392 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2584 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2164 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1488 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1912 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 664 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2412 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 604 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2468 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 2628 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 2628 schtasks.exe 34 -
Executes dropped EXE 2 IoCs
pid Process 2432 BlockPortdriverCommon.exe 1580 System.exe -
Loads dropped DLL 2 IoCs
pid Process 2804 cmd.exe 2804 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\BlockPortdriverCommon = "\"C:\\surrogatesession\\BlockPortdriverCommon.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\surrogatesession\\explorer.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Windows\\Tasks\\System.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files (x86)\\Internet Explorer\\SIGNUP\\Idle.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\BlockPortdriverCommon = "\"C:\\Recovery\\31f19e42-8726-11ef-be9a-dab21757c799\\BlockPortdriverCommon.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BlockPortdriverCommon = "\"C:\\Recovery\\31f19e42-8726-11ef-be9a-dab21757c799\\BlockPortdriverCommon.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\System.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\surrogatesession\\explorer.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Windows\\Tasks\\System.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files (x86)\\Internet Explorer\\SIGNUP\\Idle.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\System.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BlockPortdriverCommon = "\"C:\\surrogatesession\\BlockPortdriverCommon.exe\"" BlockPortdriverCommon.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCF437359A81BF4973BEB995EC402D7D1F.TMP csc.exe File created \??\c:\Windows\System32\hi5-9c.exe csc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\SIGNUP\Idle.exe BlockPortdriverCommon.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\6ccacd8608530f BlockPortdriverCommon.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\System.exe BlockPortdriverCommon.exe File created C:\Windows\Tasks\27d1bcfc3c54e0 BlockPortdriverCommon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nixware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2604 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2604 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2176 schtasks.exe 604 schtasks.exe 1732 schtasks.exe 2436 schtasks.exe 1640 schtasks.exe 2056 schtasks.exe 1912 schtasks.exe 2468 schtasks.exe 2164 schtasks.exe 1488 schtasks.exe 664 schtasks.exe 2008 schtasks.exe 392 schtasks.exe 2924 schtasks.exe 2412 schtasks.exe 2168 schtasks.exe 1768 schtasks.exe 2584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe 2432 BlockPortdriverCommon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2432 BlockPortdriverCommon.exe Token: SeDebugPrivilege 1580 System.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2456 2208 Nixware.exe 30 PID 2208 wrote to memory of 2456 2208 Nixware.exe 30 PID 2208 wrote to memory of 2456 2208 Nixware.exe 30 PID 2208 wrote to memory of 2456 2208 Nixware.exe 30 PID 2456 wrote to memory of 2804 2456 WScript.exe 31 PID 2456 wrote to memory of 2804 2456 WScript.exe 31 PID 2456 wrote to memory of 2804 2456 WScript.exe 31 PID 2456 wrote to memory of 2804 2456 WScript.exe 31 PID 2804 wrote to memory of 2432 2804 cmd.exe 33 PID 2804 wrote to memory of 2432 2804 cmd.exe 33 PID 2804 wrote to memory of 2432 2804 cmd.exe 33 PID 2804 wrote to memory of 2432 2804 cmd.exe 33 PID 2432 wrote to memory of 1612 2432 BlockPortdriverCommon.exe 38 PID 2432 wrote to memory of 1612 2432 BlockPortdriverCommon.exe 38 PID 2432 wrote to memory of 1612 2432 BlockPortdriverCommon.exe 38 PID 1612 wrote to memory of 2840 1612 csc.exe 40 PID 1612 wrote to memory of 2840 1612 csc.exe 40 PID 1612 wrote to memory of 2840 1612 csc.exe 40 PID 2432 wrote to memory of 876 2432 BlockPortdriverCommon.exe 56 PID 2432 wrote to memory of 876 2432 BlockPortdriverCommon.exe 56 PID 2432 wrote to memory of 876 2432 BlockPortdriverCommon.exe 56 PID 876 wrote to memory of 1036 876 cmd.exe 58 PID 876 wrote to memory of 1036 876 cmd.exe 58 PID 876 wrote to memory of 1036 876 cmd.exe 58 PID 876 wrote to memory of 2604 876 cmd.exe 59 PID 876 wrote to memory of 2604 876 cmd.exe 59 PID 876 wrote to memory of 2604 876 cmd.exe 59 PID 876 wrote to memory of 1580 876 cmd.exe 60 PID 876 wrote to memory of 1580 876 cmd.exe 60 PID 876 wrote to memory of 1580 876 cmd.exe 60 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nixware.exe"C:\Users\Admin\AppData\Local\Temp\Nixware.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\surrogatesession\9Jg3KVOjcV42zUZPCuIVZgehfMBu6YbdOPQ48qfJn162TYBQ.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\surrogatesession\SnwsOZ2aiJutXMyXmD.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\surrogatesession\BlockPortdriverCommon.exe"C:\surrogatesession/BlockPortdriverCommon.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zpmf1zpj\zpmf1zpj.cmdline"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB6F0.tmp" "c:\Windows\System32\CSCF437359A81BF4973BEB995EC402D7D1F.TMP"6⤵PID:2840
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LpuYxq6Ltx.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1036
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2604
-
-
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\System.exe"C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\System.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\surrogatesession\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\surrogatesession\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\surrogatesession\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Windows\Tasks\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\Tasks\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Windows\Tasks\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\SIGNUP\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\SIGNUP\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\SIGNUP\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockPortdriverCommonB" /sc MINUTE /mo 5 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\BlockPortdriverCommon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockPortdriverCommon" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\BlockPortdriverCommon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockPortdriverCommonB" /sc MINUTE /mo 10 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\BlockPortdriverCommon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockPortdriverCommonB" /sc MINUTE /mo 14 /tr "'C:\surrogatesession\BlockPortdriverCommon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockPortdriverCommon" /sc ONLOGON /tr "'C:\surrogatesession\BlockPortdriverCommon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockPortdriverCommonB" /sc MINUTE /mo 9 /tr "'C:\surrogatesession\BlockPortdriverCommon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2008
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD577d8b46b5618a8b69f7d26402587cb66
SHA1285cb62ebcd0e2057dc9da32151e47a1695bb032
SHA2562d8f051e366d4363f18b716dec8186763b2482141d5e0343d3a40a00e6756e0f
SHA512e76483ed1634d3a95d99ec29aefdc76c37833264d6faf11e12e9af29a76f1245f6ce203b86d7dfc4cd209d326a2ebe022904ba79f3af3df955065cc59f07f296
-
Filesize
1KB
MD58964d4a5e4fdc9b11fdfeeda0ff5dac7
SHA10f0ef52c0d70fdfc925d260841dfe1b281e98ef1
SHA256df173699e32c5e560b266b46d2c10b35acc2252cbda5798cd72714f42692db0f
SHA512db363ded8ec25710aef9949b7bd66c7eab3926f393dfe56e44bb896ee95c61f26e492f9738ca8c84234ed3e2a450e1abf18bca4c89413a8482d19497672786c8
-
Filesize
213B
MD5f8702ecc9e0f72ccee89fdef7a40b971
SHA1a495334be7d04fd4d3d4ceba0b1b846a0ad76d78
SHA256eea23b38c07a415c44a958410d435a4266ebdf7b7cdbb57c2f011b094df99cd5
SHA51268c8b4ebc2c57f0716b6c62d2596686f50a1a02b58a8090dcffec1615125b05ad76e9650be78e094b9df29f4ca3ac91d4ca7718abe4502266ecca8b44c872ee4
-
Filesize
2.0MB
MD577905da28eb0ae1c97f92d614f341411
SHA1aa7a9229ede890bc8efd667aa4ac488517260f32
SHA2563c53924669c7c88687d862775af6f78fb2c656d93577f8c96358918e984d8a42
SHA51266b36b0bc4f38d069ab02adb7d0d2a030ea2268bc826c24533193bc3477c703d941bad86433cfd04af27af6854ee60f17eb1dd84440ebab9494b1d5b0d8ba904
-
Filesize
105B
MD5c4ede3cc43ab27c5ac840dfd8cd98632
SHA161b6df44c8563c5d400c50bbedd91ee9d8c4b28c
SHA25664eab9ebe09f70865dbb3f35b7e5b76d3ac1c6246bfe7d08569d218a6d0bcfcb
SHA512715182ee0e5a1a38be29484d6b241a80360dd6afcf9991330d5b278c8bb7ea371d89cd7edf4d943dcc405ce85ff276ea882b219eb1f50526307c02ce1f354ade
-
Filesize
364B
MD5112e61fafdc9351bddee86b2cbea89e1
SHA154e3b0d3df1f34a1737cf037a2afdd635b3b45d0
SHA256d7e3d85ef89aab031cc31eb2ea5db7645637b38389a61fd2f0c6f4037a06495c
SHA51212aa1cec92f64495adef35e2ea03daa0d07b4dafe0541447889c5abbecb5725a5144bdfb6749cb1cfa887faa5f848e28a7ac25c2068cb4463ac63e2ded68af19
-
Filesize
235B
MD5072f7f0249877df60f1554a0e57c4f37
SHA1f2e45540ff4c370f5c2b1a0428ee5cdda760072b
SHA2562d50f9fb5338a5990291b7caec299672f6e0ee360271758b682e8e1cc3d12cb9
SHA5124501582e2e6b31f0914da2ddb3c00443128447bdb05f46748922392b6eea6a2fd7401e9d42b0354dd56dca69e078ce011e3b9743610b1a6dd971666f733a476f
-
Filesize
1KB
MD560a1ebb8f840aad127346a607d80fc19
SHA1c8b7e9ad601ac19ab90b3e36f811960e8badf354
SHA2569d6a9d38b7a86cc88e551a0c1172a3fb387b1a5f928ac13993ec3387d39cc243
SHA51244830cefb264bac520174b4b884312dd0393be33a193d4f0fee3cc3c14deb86ca39e43ef281232f9169fd204d19b22e8a7aad72fa448ca52d5cbc3ee1dbb18a4