Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2025, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe
Resource
win10v2004-20241007-en
General
-
Target
df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe
-
Size
2.4MB
-
MD5
62e601a986371d6a6ce17d5a78a0feba
-
SHA1
24fc031ffd01e114fc3f78e1fc302ce3208b431c
-
SHA256
df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32
-
SHA512
19a4ab73a01b017a460844ddd7cd77c99452d78eb0e0e921bde6ee1946d4fa460f436a033232fa711c73971a8614c995e985fb9b17d4dadcf486b7d40ab9d02d
-
SSDEEP
24576:zTbBv5rUNgz5PNmEetaAO6p1mTYhqIizNJ3wZK+Y/mtO/1uia2wf9GsVcoiJBRsd:tBmG5VivbqP3wZKZ/J/Zwf04k8FiGQ+
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Java\\jdk-1.8\\jre\\bin\\RuntimeBroker.exe\", \"C:\\Users\\Default User\\upfc.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\sppsvc.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Java\\jdk-1.8\\jre\\bin\\RuntimeBroker.exe\", \"C:\\Users\\Default User\\upfc.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\sppsvc.exe\", \"C:\\MsChainbrowserweb\\System.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Java\\jdk-1.8\\jre\\bin\\RuntimeBroker.exe\", \"C:\\Users\\Default User\\upfc.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\sppsvc.exe\", \"C:\\MsChainbrowserweb\\System.exe\", \"C:\\Program Files\\Microsoft Office 15\\ClientX64\\conhost.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Java\\jdk-1.8\\jre\\bin\\RuntimeBroker.exe\", \"C:\\Users\\Default User\\upfc.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\sppsvc.exe\", \"C:\\MsChainbrowserweb\\System.exe\", \"C:\\Program Files\\Microsoft Office 15\\ClientX64\\conhost.exe\", \"C:\\MsChainbrowserweb\\ComponentbrowserWebrefsvc.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Java\\jdk-1.8\\jre\\bin\\RuntimeBroker.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Java\\jdk-1.8\\jre\\bin\\RuntimeBroker.exe\", \"C:\\Users\\Default User\\upfc.exe\"" ComponentbrowserWebrefsvc.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3320 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1488 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4796 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5052 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4732 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 604 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4332 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4896 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3184 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4296 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3416 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 648 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3496 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 536 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5096 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4912 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3444 3628 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3096 3628 schtasks.exe 86 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ComponentbrowserWebrefsvc.exe -
Executes dropped EXE 2 IoCs
pid Process 3176 ComponentbrowserWebrefsvc.exe 4820 RuntimeBroker.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Java\\jdk-1.8\\jre\\bin\\RuntimeBroker.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Users\\Default User\\upfc.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\sppsvc.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MsChainbrowserweb\\System.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Program Files\\Microsoft Office 15\\ClientX64\\conhost.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ComponentbrowserWebrefsvc = "\"C:\\MsChainbrowserweb\\ComponentbrowserWebrefsvc.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Java\\jdk-1.8\\jre\\bin\\RuntimeBroker.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Users\\Default User\\upfc.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\sppsvc.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MsChainbrowserweb\\System.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Program Files\\Microsoft Office 15\\ClientX64\\conhost.exe\"" ComponentbrowserWebrefsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ComponentbrowserWebrefsvc = "\"C:\\MsChainbrowserweb\\ComponentbrowserWebrefsvc.exe\"" ComponentbrowserWebrefsvc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC92B1CC5F6B55476C90F31986ABB0E0C1.TMP csc.exe File created \??\c:\Windows\System32\lhkpi-.exe csc.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Reference Assemblies\Microsoft\sppsvc.exe ComponentbrowserWebrefsvc.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\0a1fd5f707cd16 ComponentbrowserWebrefsvc.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\RuntimeBroker.exe ComponentbrowserWebrefsvc.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\9e8d7a4ca61bd9 ComponentbrowserWebrefsvc.exe File created C:\Program Files\Microsoft Office 15\ClientX64\conhost.exe ComponentbrowserWebrefsvc.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\conhost.exe ComponentbrowserWebrefsvc.exe File created C:\Program Files\Microsoft Office 15\ClientX64\088424020bedd6 ComponentbrowserWebrefsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings ComponentbrowserWebrefsvc.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3444 schtasks.exe 3096 schtasks.exe 4796 schtasks.exe 4896 schtasks.exe 3184 schtasks.exe 4296 schtasks.exe 536 schtasks.exe 3320 schtasks.exe 1488 schtasks.exe 4332 schtasks.exe 3416 schtasks.exe 3496 schtasks.exe 4912 schtasks.exe 4732 schtasks.exe 604 schtasks.exe 5096 schtasks.exe 5052 schtasks.exe 648 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe 3176 ComponentbrowserWebrefsvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3176 ComponentbrowserWebrefsvc.exe Token: SeDebugPrivilege 4820 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3484 wrote to memory of 2336 3484 df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe 82 PID 3484 wrote to memory of 2336 3484 df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe 82 PID 3484 wrote to memory of 2336 3484 df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe 82 PID 2336 wrote to memory of 4048 2336 WScript.exe 83 PID 2336 wrote to memory of 4048 2336 WScript.exe 83 PID 2336 wrote to memory of 4048 2336 WScript.exe 83 PID 4048 wrote to memory of 3176 4048 cmd.exe 85 PID 4048 wrote to memory of 3176 4048 cmd.exe 85 PID 3176 wrote to memory of 4792 3176 ComponentbrowserWebrefsvc.exe 90 PID 3176 wrote to memory of 4792 3176 ComponentbrowserWebrefsvc.exe 90 PID 4792 wrote to memory of 3960 4792 csc.exe 92 PID 4792 wrote to memory of 3960 4792 csc.exe 92 PID 3176 wrote to memory of 2264 3176 ComponentbrowserWebrefsvc.exe 108 PID 3176 wrote to memory of 2264 3176 ComponentbrowserWebrefsvc.exe 108 PID 2264 wrote to memory of 4436 2264 cmd.exe 110 PID 2264 wrote to memory of 4436 2264 cmd.exe 110 PID 2264 wrote to memory of 1100 2264 cmd.exe 111 PID 2264 wrote to memory of 1100 2264 cmd.exe 111 PID 2264 wrote to memory of 4820 2264 cmd.exe 115 PID 2264 wrote to memory of 4820 2264 cmd.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe"C:\Users\Admin\AppData\Local\Temp\df448c9263a19f8471ee6d897a339360d610a44b725e6c28f115ff4da7f70e32.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MsChainbrowserweb\IkYDd80xTTPifjZ0ql0Oju60y6xFKjrayyuJ6q3Lt.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\MsChainbrowserweb\VjHSX7CifHTZSyWiEP30gXg6skFL8ARMSgjExtHXuC5j.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\MsChainbrowserweb\ComponentbrowserWebrefsvc.exe"C:\MsChainbrowserweb/ComponentbrowserWebrefsvc.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fhesqyzu\fhesqyzu.cmdline"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD244.tmp" "c:\Windows\System32\CSC92B1CC5F6B55476C90F31986ABB0E0C1.TMP"6⤵PID:3960
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PT7y4aVDLh.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:4436
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1100
-
-
C:\Program Files\Java\jdk-1.8\jre\bin\RuntimeBroker.exe"C:\Program Files\Java\jdk-1.8\jre\bin\RuntimeBroker.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Java\jdk-1.8\jre\bin\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Java\jdk-1.8\jre\bin\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Java\jdk-1.8\jre\bin\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\Default User\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\MsChainbrowserweb\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MsChainbrowserweb\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\MsChainbrowserweb\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\ClientX64\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ComponentbrowserWebrefsvcC" /sc MINUTE /mo 7 /tr "'C:\MsChainbrowserweb\ComponentbrowserWebrefsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ComponentbrowserWebrefsvc" /sc ONLOGON /tr "'C:\MsChainbrowserweb\ComponentbrowserWebrefsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ComponentbrowserWebrefsvcC" /sc MINUTE /mo 12 /tr "'C:\MsChainbrowserweb\ComponentbrowserWebrefsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3096
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5fb0f2e049db96d6e8d9e84bda3a08193
SHA12bb51ca4db5bcf877e68541189fe99e7c070b579
SHA256912f7f6b2a8bc1932e3b02ead638de1fbb5875f947730cf587fa63f63060bae5
SHA51247d7c47730e433bd46b955f65dc3aea00b736e4e3f90fa7cea644e31f16ec12c9254e6039490193426217405935f3309dc88c2bf24672b3d27837e69d5ca35db
-
Filesize
240B
MD593e993dbfd36957a2929c22bb21a8293
SHA155c48ebcf72e53ebb90108d050255deac4f388f8
SHA256974506b2ad39a3ec0225b5cb3cbb8f774a032679d27ca1af3880ec1371498e19
SHA512c47d40d530b42dfcbc3ef1c225aad7f0e1e18256459b579dd2b46b70ac354b02f6442564528a5991b3a966ab996423c91d863949a7d90b16541ccf9e40ac5a8b
-
Filesize
101B
MD5b203c0ee33eade47ff78546bd923f433
SHA17928af76541c7b0e8ba5c32757f44d9954febcde
SHA2565a367b756472a10df4a315e3b98f738f39706d1b57ae90c22dd69518b9b14430
SHA51240e80f6f75061b50d513136ae710a34b584cc3151db3728ba4ad4eeaa12a369b35ed33d242823801d667a838e428f035d1c866940530f9ba8fea6d53e5d56b75
-
Filesize
231B
MD5b5d022a5ff488499475350adadff3413
SHA1d027675e1c0a1386dec7a239282c89c3c958ad2e
SHA25698fd4fae73eab055a1f2bcb75abcaf23ef0308f18490dcd73053a8a8f918402f
SHA51252c25fca082c3aba6e37a83697b36b8b34727d9d5737437c8ff1376b0c7ced00a41563541a7532631ea9d2c51ed06d88f89a3a87d63c5c8311700083995fb15f
-
Filesize
1KB
MD5a9935eee576f0e70476530d5076ed0a6
SHA161ba48696ee7bb49b4fd8f411ab13dd3bde71583
SHA256df66e710b69c0ba059d1991f7fbb3d7a9dac9c3cc47c00c03fc9a01f92057433
SHA512bbaa7b2b69ac4d85f9e7b427d304769cfe7a6b8897199d2c4495a8d1eff122e8e97c69291fd3d93674815e3b04214eb3c3d74f2d98ce92397e625dd830bb19fb
-
Filesize
387B
MD58d91de5dd3202f91279dc1b2133eeb1f
SHA1c034aff73bc2898665b5faa57db170c2052bef3e
SHA256e789d2d51ef81837788936308b0ec42746e2f10bcf753e6709ee75d04ac9c7c6
SHA512fb15154a371293f24f392d8eff43d5232df95368a8b69ce66f6fed85592faea5c0ed4bc359ce67decf779dec20f6805791e9ce413573d4830751e6f7bf9b38fe
-
Filesize
235B
MD5ab2ff7d828c9b34985c648dea110318c
SHA14d90845ebedf0c3b877e32c57618c8ef22e44b22
SHA256e8f34852125ee651dff25452c2e469636f2f57497f7ddfcc6d24be8ccf6a6cbb
SHA512d394450dd4e47854f5c625d4b4932aeca690e51b19b000313c0cec91bc019ced600bb9611aadb085611bd3c33cce4d0f775a3699d0388d9f511ca408acc17fe8
-
Filesize
1KB
MD575e32610d8ef6143201c7c28465fcda9
SHA1b2bae99fade2dda07aecbe1659d184be0fc4e7a6
SHA25697ee1cac3965d9cc55a60f20206f384719431f19ac96bdc52b93a98de51a639b
SHA512b303fb99586efd19a08223ba93472fa6d33fcf9198bbf42fb16ba61001db59e5fd5835ea7696ed34e4004d23fa60697e724e6085d1269d788204bf95dfe46abc