Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 15:03
Static task
static1
Behavioral task
behavioral1
Sample
Nixware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Nixware.exe
Resource
win10v2004-20241007-en
General
-
Target
Nixware.exe
-
Size
2.7MB
-
MD5
d07543cb1bc6f660adcb7107ab33f270
-
SHA1
8421ed19516a2152e4a53d694179107f3ef585c0
-
SHA256
be08dac8fc827b41b19be240140f13e19a802e6c6108105cc303a873c57a20c4
-
SHA512
03b6e377af1022d298aeac70c779b621cb5c0e636874e7739fa7ad30b1d64a08a16429719f89dcd0122f8b7309b20708672f8da32577e0265c3c8b34bae2add0
-
SSDEEP
49152:GB7nRsoz7nIZgHltNj/VImvhIudDXtNHUxQ:Y7nq27nIENjqihIerHUxQ
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\smss.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\smss.exe\", \"C:\\Program Files\\dotnet\\shared\\Microsoft.WindowsDesktop.App\\6.0.27\\zh-Hans\\BlockPortdriverCommon.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\smss.exe\", \"C:\\Program Files\\dotnet\\shared\\Microsoft.WindowsDesktop.App\\6.0.27\\zh-Hans\\BlockPortdriverCommon.exe\", \"C:\\Recovery\\WindowsRE\\cmd.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\smss.exe\", \"C:\\Program Files\\dotnet\\shared\\Microsoft.WindowsDesktop.App\\6.0.27\\zh-Hans\\BlockPortdriverCommon.exe\", \"C:\\Recovery\\WindowsRE\\cmd.exe\", \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\smss.exe\", \"C:\\Program Files\\dotnet\\shared\\Microsoft.WindowsDesktop.App\\6.0.27\\zh-Hans\\BlockPortdriverCommon.exe\", \"C:\\Recovery\\WindowsRE\\cmd.exe\", \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\surrogatesession\\sihost.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\smss.exe\", \"C:\\Program Files\\dotnet\\shared\\Microsoft.WindowsDesktop.App\\6.0.27\\zh-Hans\\BlockPortdriverCommon.exe\", \"C:\\Recovery\\WindowsRE\\cmd.exe\", \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\surrogatesession\\sihost.exe\", \"C:\\surrogatesession\\BlockPortdriverCommon.exe\"" BlockPortdriverCommon.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4144 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1548 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1280 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4744 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4028 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3988 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3116 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3888 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2800 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4964 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4076 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2208 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3796 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1572 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 688 2944 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 932 2944 schtasks.exe 86 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Nixware.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation BlockPortdriverCommon.exe -
Executes dropped EXE 2 IoCs
pid Process 856 BlockPortdriverCommon.exe 4412 smss.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BlockPortdriverCommon = "\"C:\\surrogatesession\\BlockPortdriverCommon.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\smss.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BlockPortdriverCommon = "\"C:\\Program Files\\dotnet\\shared\\Microsoft.WindowsDesktop.App\\6.0.27\\zh-Hans\\BlockPortdriverCommon.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\surrogatesession\\sihost.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\surrogatesession\\sihost.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BlockPortdriverCommon = "\"C:\\surrogatesession\\BlockPortdriverCommon.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\smss.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BlockPortdriverCommon = "\"C:\\Program Files\\dotnet\\shared\\Microsoft.WindowsDesktop.App\\6.0.27\\zh-Hans\\BlockPortdriverCommon.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Recovery\\WindowsRE\\cmd.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Recovery\\WindowsRE\\cmd.exe\"" BlockPortdriverCommon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" BlockPortdriverCommon.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC939264E017F64AF8A41A89E22CC3AD2E.TMP csc.exe File created \??\c:\Windows\System32\lhkpi-.exe csc.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\BlockPortdriverCommon.exe BlockPortdriverCommon.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\857118377dc6da BlockPortdriverCommon.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\smss.exe BlockPortdriverCommon.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\69ddcba757bf72 BlockPortdriverCommon.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ImmersiveControlPanel\ja-JP\dllhost.exe BlockPortdriverCommon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nixware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2600 PING.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings Nixware.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings BlockPortdriverCommon.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2600 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4744 schtasks.exe 1656 schtasks.exe 3116 schtasks.exe 2800 schtasks.exe 4964 schtasks.exe 932 schtasks.exe 3796 schtasks.exe 4144 schtasks.exe 1548 schtasks.exe 1280 schtasks.exe 3988 schtasks.exe 2208 schtasks.exe 1572 schtasks.exe 688 schtasks.exe 4028 schtasks.exe 1520 schtasks.exe 3888 schtasks.exe 4076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe 856 BlockPortdriverCommon.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4412 smss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 856 BlockPortdriverCommon.exe Token: SeDebugPrivilege 4412 smss.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1724 wrote to memory of 4856 1724 Nixware.exe 82 PID 1724 wrote to memory of 4856 1724 Nixware.exe 82 PID 1724 wrote to memory of 4856 1724 Nixware.exe 82 PID 4856 wrote to memory of 2780 4856 WScript.exe 88 PID 4856 wrote to memory of 2780 4856 WScript.exe 88 PID 4856 wrote to memory of 2780 4856 WScript.exe 88 PID 2780 wrote to memory of 856 2780 cmd.exe 90 PID 2780 wrote to memory of 856 2780 cmd.exe 90 PID 856 wrote to memory of 4124 856 BlockPortdriverCommon.exe 94 PID 856 wrote to memory of 4124 856 BlockPortdriverCommon.exe 94 PID 4124 wrote to memory of 4832 4124 csc.exe 96 PID 4124 wrote to memory of 4832 4124 csc.exe 96 PID 856 wrote to memory of 3972 856 BlockPortdriverCommon.exe 114 PID 856 wrote to memory of 3972 856 BlockPortdriverCommon.exe 114 PID 3972 wrote to memory of 1216 3972 cmd.exe 116 PID 3972 wrote to memory of 1216 3972 cmd.exe 116 PID 3972 wrote to memory of 2600 3972 cmd.exe 117 PID 3972 wrote to memory of 2600 3972 cmd.exe 117 PID 3972 wrote to memory of 4412 3972 cmd.exe 118 PID 3972 wrote to memory of 4412 3972 cmd.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nixware.exe"C:\Users\Admin\AppData\Local\Temp\Nixware.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\surrogatesession\9Jg3KVOjcV42zUZPCuIVZgehfMBu6YbdOPQ48qfJn162TYBQ.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\surrogatesession\SnwsOZ2aiJutXMyXmD.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\surrogatesession\BlockPortdriverCommon.exe"C:\surrogatesession/BlockPortdriverCommon.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qlutw23y\qlutw23y.cmdline"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCEC9.tmp" "c:\Windows\System32\CSC939264E017F64AF8A41A89E22CC3AD2E.TMP"6⤵PID:4832
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fHDznW7oXh.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1216
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2600
-
-
C:\Program Files (x86)\Reference Assemblies\Microsoft\smss.exe"C:\Program Files (x86)\Reference Assemblies\Microsoft\smss.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockPortdriverCommonB" /sc MINUTE /mo 10 /tr "'C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\BlockPortdriverCommon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockPortdriverCommon" /sc ONLOGON /tr "'C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\BlockPortdriverCommon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockPortdriverCommonB" /sc MINUTE /mo 11 /tr "'C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\BlockPortdriverCommon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 12 /tr "'C:\surrogatesession\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\surrogatesession\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\surrogatesession\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockPortdriverCommonB" /sc MINUTE /mo 12 /tr "'C:\surrogatesession\BlockPortdriverCommon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockPortdriverCommon" /sc ONLOGON /tr "'C:\surrogatesession\BlockPortdriverCommon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BlockPortdriverCommonB" /sc MINUTE /mo 12 /tr "'C:\surrogatesession\BlockPortdriverCommon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:932
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54e087d5c0985d7fd80b2258383e9227b
SHA1679840c13cf000af1ce18bd8bfd7b706953b6dd5
SHA25669a8b36b8ee555132b5b58d2e2f1d98f6b3196bd1fbb27bc367846241f33d29e
SHA5128a47a90ac128ed7b4f391c432c0fa53f489fea1a74a0eda0bcc762dc77e8f6f697e9a04f19e2b5ff7c9e780e4e7c602a81cdefaec0ab1afc9d7bfb964dba4d84
-
Filesize
190B
MD52a0238025a530398b9d4f43e815c915c
SHA1d300c9889b5e68eccecf442add4b36602e8ea868
SHA25633a4f89281f3365cdd3cea43eff20b250fe4ff6cdfa50808f616fbe4910b94a9
SHA51251a6fb23a116ad92960101307a0385d4a291710da244aca86105dcb22284a66f85a20e07e8f4e2e62bec93d23eb2ac792f768039881fc62df1cc7e3bf137ba33
-
Filesize
213B
MD5f8702ecc9e0f72ccee89fdef7a40b971
SHA1a495334be7d04fd4d3d4ceba0b1b846a0ad76d78
SHA256eea23b38c07a415c44a958410d435a4266ebdf7b7cdbb57c2f011b094df99cd5
SHA51268c8b4ebc2c57f0716b6c62d2596686f50a1a02b58a8090dcffec1615125b05ad76e9650be78e094b9df29f4ca3ac91d4ca7718abe4502266ecca8b44c872ee4
-
Filesize
2.0MB
MD577905da28eb0ae1c97f92d614f341411
SHA1aa7a9229ede890bc8efd667aa4ac488517260f32
SHA2563c53924669c7c88687d862775af6f78fb2c656d93577f8c96358918e984d8a42
SHA51266b36b0bc4f38d069ab02adb7d0d2a030ea2268bc826c24533193bc3477c703d941bad86433cfd04af27af6854ee60f17eb1dd84440ebab9494b1d5b0d8ba904
-
Filesize
105B
MD5c4ede3cc43ab27c5ac840dfd8cd98632
SHA161b6df44c8563c5d400c50bbedd91ee9d8c4b28c
SHA25664eab9ebe09f70865dbb3f35b7e5b76d3ac1c6246bfe7d08569d218a6d0bcfcb
SHA512715182ee0e5a1a38be29484d6b241a80360dd6afcf9991330d5b278c8bb7ea371d89cd7edf4d943dcc405ce85ff276ea882b219eb1f50526307c02ce1f354ade
-
Filesize
394B
MD5bac0e6b86fbc67bb9fb577119cb4ba76
SHA168f6136449d22044bd5dd12831d600bbadaa5866
SHA256838139be12be5631b55811a3ce60d378726dbf527a046c818381d5ff5314b5c9
SHA512c1b78205d425d5e0bd5e62ade5d55ac735b4579ba683a42d6c3a3c1a967b2da636c8f7064ea8dc2798db177a199a42d636742c10a1559329132e72412a7c104d
-
Filesize
235B
MD5cade95281ab8ff7532a8f071c4717504
SHA1f9f5ca67b7e73794f73b8b89e34883e4b8d48e07
SHA25630157ab7b6030d05254bc542ddfe9a5f22e5a6069449b1005e5b8881951848dc
SHA5125eb140a92a8356011aadd83fbd4d967d76ffcede9e33a1e6d825783ee7fb794020a0bd15c306ec8163c3ea1eb49b048d6a13e7aecd4006dba6b494b162e9022d
-
Filesize
1KB
MD575e32610d8ef6143201c7c28465fcda9
SHA1b2bae99fade2dda07aecbe1659d184be0fc4e7a6
SHA25697ee1cac3965d9cc55a60f20206f384719431f19ac96bdc52b93a98de51a639b
SHA512b303fb99586efd19a08223ba93472fa6d33fcf9198bbf42fb16ba61001db59e5fd5835ea7696ed34e4004d23fa60697e724e6085d1269d788204bf95dfe46abc