Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/01/2025, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe
Resource
win10v2004-20241007-en
General
-
Target
df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe
-
Size
2.4MB
-
MD5
62e601a986371d6a6ce17d5a78a0feba
-
SHA1
24fc031ffd01e114fc3f78e1fc302ce3208b431c
-
SHA256
df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32
-
SHA512
19a4ab73a01b017a460844ddd7cd77c99452d78eb0e0e921bde6ee1946d4fa460f436a033232fa711c73971a8614c995e985fb9b17d4dadcf486b7d40ab9d02d
-
SSDEEP
24576:zTbBv5rUNgz5PNmEetaAO6p1mTYhqIizNJ3wZK+Y/mtO/1uia2wf9GsVcoiJBRsd:tBmG5VivbqP3wZKZ/J/Zwf04k8FiGQ+
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Favorites\\conhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Windows\\IME\\imekr8\\OSPPSVC.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Favorites\\conhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Windows\\IME\\imekr8\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\v1.0\\taskhost.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Favorites\\conhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Windows\\IME\\imekr8\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\v1.0\\taskhost.exe\", \"C:\\Users\\Public\\smss.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Favorites\\conhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Windows\\IME\\imekr8\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\v1.0\\taskhost.exe\", \"C:\\Users\\Public\\smss.exe\", \"C:\\MsChainbrowserweb\\ComponentbrowserWebrefsvc.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Favorites\\conhost.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Favorites\\conhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\services.exe\"" ComponentbrowserWebrefsvc.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2388 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1840 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1108 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2772 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2784 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2416 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2800 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1832 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1596 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2060 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 236 2616 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 2616 schtasks.exe 34 -
Executes dropped EXE 2 IoCs
pid Process 2560 ComponentbrowserWebrefsvc.exe 952 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2700 cmd.exe 2700 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\v1.0\\taskhost.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Users\\Public\\smss.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\ComponentbrowserWebrefsvc = "\"C:\\MsChainbrowserweb\\ComponentbrowserWebrefsvc.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Users\\Admin\\Favorites\\conhost.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\services.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Windows\\IME\\imekr8\\OSPPSVC.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\v1.0\\taskhost.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ComponentbrowserWebrefsvc = "\"C:\\MsChainbrowserweb\\ComponentbrowserWebrefsvc.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Users\\Admin\\Favorites\\conhost.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\services.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Windows\\IME\\imekr8\\OSPPSVC.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Users\\Public\\smss.exe\"" ComponentbrowserWebrefsvc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC52721A8F7B1C4B7E84277E65EB7D07F.TMP csc.exe File created \??\c:\Windows\System32\dzuhbf.exe csc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\taskhost.exe ComponentbrowserWebrefsvc.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\b75386f1303e64 ComponentbrowserWebrefsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\IME\imekr8\OSPPSVC.exe ComponentbrowserWebrefsvc.exe File created C:\Windows\IME\imekr8\1610b97d3ab4a7 ComponentbrowserWebrefsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2248 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2248 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2136 schtasks.exe 2064 schtasks.exe 1840 schtasks.exe 1108 schtasks.exe 1832 schtasks.exe 2932 schtasks.exe 2492 schtasks.exe 2772 schtasks.exe 2800 schtasks.exe 2116 schtasks.exe 236 schtasks.exe 760 schtasks.exe 2388 schtasks.exe 2416 schtasks.exe 1924 schtasks.exe 1596 schtasks.exe 2060 schtasks.exe 2784 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 2560 ComponentbrowserWebrefsvc.exe 952 taskhost.exe 952 taskhost.exe 952 taskhost.exe 952 taskhost.exe 952 taskhost.exe 952 taskhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2560 ComponentbrowserWebrefsvc.exe Token: SeDebugPrivilege 952 taskhost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2832 2816 df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe 30 PID 2816 wrote to memory of 2832 2816 df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe 30 PID 2816 wrote to memory of 2832 2816 df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe 30 PID 2816 wrote to memory of 2832 2816 df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe 30 PID 2832 wrote to memory of 2700 2832 WScript.exe 31 PID 2832 wrote to memory of 2700 2832 WScript.exe 31 PID 2832 wrote to memory of 2700 2832 WScript.exe 31 PID 2832 wrote to memory of 2700 2832 WScript.exe 31 PID 2700 wrote to memory of 2560 2700 cmd.exe 33 PID 2700 wrote to memory of 2560 2700 cmd.exe 33 PID 2700 wrote to memory of 2560 2700 cmd.exe 33 PID 2700 wrote to memory of 2560 2700 cmd.exe 33 PID 2560 wrote to memory of 2792 2560 ComponentbrowserWebrefsvc.exe 38 PID 2560 wrote to memory of 2792 2560 ComponentbrowserWebrefsvc.exe 38 PID 2560 wrote to memory of 2792 2560 ComponentbrowserWebrefsvc.exe 38 PID 2792 wrote to memory of 1232 2792 csc.exe 40 PID 2792 wrote to memory of 1232 2792 csc.exe 40 PID 2792 wrote to memory of 1232 2792 csc.exe 40 PID 2560 wrote to memory of 2860 2560 ComponentbrowserWebrefsvc.exe 56 PID 2560 wrote to memory of 2860 2560 ComponentbrowserWebrefsvc.exe 56 PID 2560 wrote to memory of 2860 2560 ComponentbrowserWebrefsvc.exe 56 PID 2860 wrote to memory of 3012 2860 cmd.exe 58 PID 2860 wrote to memory of 3012 2860 cmd.exe 58 PID 2860 wrote to memory of 3012 2860 cmd.exe 58 PID 2860 wrote to memory of 2248 2860 cmd.exe 59 PID 2860 wrote to memory of 2248 2860 cmd.exe 59 PID 2860 wrote to memory of 2248 2860 cmd.exe 59 PID 2860 wrote to memory of 952 2860 cmd.exe 60 PID 2860 wrote to memory of 952 2860 cmd.exe 60 PID 2860 wrote to memory of 952 2860 cmd.exe 60 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe"C:\Users\Admin\AppData\Local\Temp\df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MsChainbrowserweb\IkYDd80xTTPifjZ0ql0Oju60y6xFKjrayyuJ6q3Lt.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\MsChainbrowserweb\VjHSX7CifHTZSyWiEP30gXg6skFL8ARMSgjExtHXuC5j.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\MsChainbrowserweb\ComponentbrowserWebrefsvc.exe"C:\MsChainbrowserweb/ComponentbrowserWebrefsvc.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xc2pjkgu\xc2pjkgu.cmdline"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9186.tmp" "c:\Windows\System32\CSC52721A8F7B1C4B7E84277E65EB7D07F.TMP"6⤵PID:1232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BB6cYnftGy.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:3012
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2248
-
-
C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\taskhost.exe"C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\taskhost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Favorites\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Admin\Favorites\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Favorites\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Windows\IME\imekr8\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\IME\imekr8\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Windows\IME\imekr8\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Users\Public\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Public\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Users\Public\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ComponentbrowserWebrefsvcC" /sc MINUTE /mo 13 /tr "'C:\MsChainbrowserweb\ComponentbrowserWebrefsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ComponentbrowserWebrefsvc" /sc ONLOGON /tr "'C:\MsChainbrowserweb\ComponentbrowserWebrefsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ComponentbrowserWebrefsvcC" /sc MINUTE /mo 12 /tr "'C:\MsChainbrowserweb\ComponentbrowserWebrefsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:760
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD593e993dbfd36957a2929c22bb21a8293
SHA155c48ebcf72e53ebb90108d050255deac4f388f8
SHA256974506b2ad39a3ec0225b5cb3cbb8f774a032679d27ca1af3880ec1371498e19
SHA512c47d40d530b42dfcbc3ef1c225aad7f0e1e18256459b579dd2b46b70ac354b02f6442564528a5991b3a966ab996423c91d863949a7d90b16541ccf9e40ac5a8b
-
Filesize
101B
MD5b203c0ee33eade47ff78546bd923f433
SHA17928af76541c7b0e8ba5c32757f44d9954febcde
SHA2565a367b756472a10df4a315e3b98f738f39706d1b57ae90c22dd69518b9b14430
SHA51240e80f6f75061b50d513136ae710a34b584cc3151db3728ba4ad4eeaa12a369b35ed33d242823801d667a838e428f035d1c866940530f9ba8fea6d53e5d56b75
-
Filesize
211B
MD5ff6f8f6a84188f5298f23575b9d1074a
SHA1ea4003dec1e6b08dd91f0178255e3ea542773990
SHA25662363c51ca57bc93b92130a4fac69a31af9bf5416ab6f1948f80af28f6910037
SHA5123a785977ccd28265b6890f77d51eeca58c7cf643ed7a251332f2150ead66b66d5dec5bcf2099e5582dbc6e96116469334f6b13e5a0f9d101df9283ec7ac8a82c
-
Filesize
1KB
MD539365b08051f552dc772f48bb6b9b830
SHA1b4a63464b43ca281edd02e76dd04651145e76c3e
SHA25662ad1af070c8c31211f6cae68119ebb7a61c25cde89f9c8e2078ddebeee565b7
SHA512384bd447abfe14c9a224499fa73c35a5d8ff3d88af7ff73b350255e16ca794acf7754855286bf722aea7d6b6a3b6371b67709a426a4f7872c5853b2fa1e1adf5
-
Filesize
368B
MD53741d19ade9c93a610a5210b14d5c6fa
SHA1e48894397f7c5ddefcba3a11f0ef9e830624afb2
SHA2566ff1eb12a69ddcf13c3911e2a24f85b58f3d0fda501053b3bb6c0d89fc8a7734
SHA5128e74c6334840c9cbea1d96d2dd93aa075a99ac2fca6c7e0f4b6e1bd7ce21c917edec9fce12e0a92878bb8c798edfbb1545d03c7cd1ba4ab806b990cc17928046
-
Filesize
235B
MD5836cefc3fecebef036603572a8b3c0bc
SHA14065325e94d25b6682d26fcfa92b91f4ece45d24
SHA256dcbade0ede3e61dfb99935497f5a28eaf4f56bf11566f5cdffca78d1ac6ae4f6
SHA51277a7500decb19aede0fd0fd13c465963f46414e98281b872ed26561352e8212dd85a1037af717f0f82352588951ad90643c8ca6d4a57fb6a47d01044f8d28ea8
-
Filesize
1KB
MD59446a6998523ec187daa3d79bec9c8fa
SHA116c7f73aef03c8a15b4d9e8b1cfa5183caf7ca96
SHA256f55f1bd2c1246cfb3b60cd8649fcc78b3837896bdf5132d6fc8ea0ecabf892d7
SHA512fac3ad1b0c8663aaa94cd66b6ea0aa1848e570ff4a22b709cf2696abb76e28f42fb0d2a74316a7ad86bb6216177013c6b71ce2f4df139edc3054a03ee3467c9d
-
Filesize
1.8MB
MD5fb0f2e049db96d6e8d9e84bda3a08193
SHA12bb51ca4db5bcf877e68541189fe99e7c070b579
SHA256912f7f6b2a8bc1932e3b02ead638de1fbb5875f947730cf587fa63f63060bae5
SHA51247d7c47730e433bd46b955f65dc3aea00b736e4e3f90fa7cea644e31f16ec12c9254e6039490193426217405935f3309dc88c2bf24672b3d27837e69d5ca35db