Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 03:58
Behavioral task
behavioral1
Sample
9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe
Resource
win10v2004-20241007-en
General
-
Target
9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe
-
Size
952KB
-
MD5
fa2fda3605fcdbaf69212aa3edb9f0f4
-
SHA1
f44fde95e3d9915f65fab24f48dcd4eb505a26da
-
SHA256
9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325
-
SHA512
019536005222cf19bdcc3c018993e3be36b1149f3b7a27938f65194b59aed6eba256e5949a119c7b90c7fe441b2201b7093e19066821875d81051e1869fccfdd
-
SSDEEP
24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\opengl32\\lsass.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\spoolsv.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\spoolsv.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\System.exe\", \"C:\\PerfLogs\\Admin\\services.exe\", \"C:\\Windows\\System32\\slc\\lsm.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\opengl32\\lsass.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\spoolsv.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\spoolsv.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\System.exe\", \"C:\\PerfLogs\\Admin\\services.exe\", \"C:\\Windows\\System32\\slc\\lsm.exe\", \"C:\\Windows\\System32\\vmictimeprovider\\smss.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\opengl32\\lsass.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\spoolsv.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\spoolsv.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\System.exe\", \"C:\\PerfLogs\\Admin\\services.exe\", \"C:\\Windows\\System32\\slc\\lsm.exe\", \"C:\\Windows\\System32\\vmictimeprovider\\smss.exe\", \"C:\\Windows\\System32\\w32time\\dllhost.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\opengl32\\lsass.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\opengl32\\lsass.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\spoolsv.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\opengl32\\lsass.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\spoolsv.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\spoolsv.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\opengl32\\lsass.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\spoolsv.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\spoolsv.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\System.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\opengl32\\lsass.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\spoolsv.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\spoolsv.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\System.exe\", \"C:\\PerfLogs\\Admin\\services.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 2128 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 2128 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2848 2128 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2456 2128 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1900 2128 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2128 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2232 2128 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2692 2128 schtasks.exe 30 -
UAC bypass 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" spoolsv.exe -
resource yara_rule behavioral1/memory/1600-1-0x00000000012C0000-0x00000000013B4000-memory.dmp dcrat behavioral1/files/0x0006000000016d47-20.dat dcrat behavioral1/files/0x0008000000015d0e-41.dat dcrat behavioral1/files/0x0009000000015d81-63.dat dcrat behavioral1/files/0x000500000001868b-97.dat dcrat behavioral1/memory/2952-132-0x0000000000020000-0x0000000000114000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2952 spoolsv.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\System32\\vmictimeprovider\\smss.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\System32\\opengl32\\lsass.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\spoolsv.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\PerfLogs\\Admin\\services.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\System32\\vmictimeprovider\\smss.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\spoolsv.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\spoolsv.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\System32\\opengl32\\lsass.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\spoolsv.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files\\Google\\Chrome\\Application\\System.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files\\Google\\Chrome\\Application\\System.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\PerfLogs\\Admin\\services.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\slc\\lsm.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\slc\\lsm.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\w32time\\dllhost.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\w32time\\dllhost.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Checks whether UAC is enabled 1 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" spoolsv.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\System32\slc\lsm.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\w32time\dllhost.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\opengl32\RCXBF0D.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\opengl32\RCXBF7B.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\slc\RCXCB48.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\opengl32\lsass.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\slc\lsm.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\vmictimeprovider\RCXCD4D.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\w32time\RCXCFBE.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\w32time\dllhost.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\slc\RCXCADA.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\vmictimeprovider\RCXCD4C.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\vmictimeprovider\smss.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\w32time\RCXCFBF.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\slc\101b941d020240259ca4912829b53995ad543df6 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\opengl32\6203df4a6bafc7c328ee7f6f8ca0a8a838a8a1b9 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\vmictimeprovider\smss.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\vmictimeprovider\69ddcba757bf72f7d36c464c71f42baab150b2b9 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\w32time\5940a34987c99120d96dace90a3f93f329dcad63 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\opengl32\lsass.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\RCXC663.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXC664.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Program Files\Google\Chrome\Application\System.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Program Files\Google\Chrome\Application\System.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Program Files\Google\Chrome\Application\27d1bcfc3c54e0e44ea423ffd4ee81fe73670a2a 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2456 schtasks.exe 1900 schtasks.exe 2612 schtasks.exe 2232 schtasks.exe 2692 schtasks.exe 2816 schtasks.exe 2820 schtasks.exe 2848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1600 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1600 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Token: SeDebugPrivilege 2952 spoolsv.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1856 1600 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe 40 PID 1600 wrote to memory of 1856 1600 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe 40 PID 1600 wrote to memory of 1856 1600 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe 40 PID 1856 wrote to memory of 2024 1856 cmd.exe 42 PID 1856 wrote to memory of 2024 1856 cmd.exe 42 PID 1856 wrote to memory of 2024 1856 cmd.exe 42 PID 1856 wrote to memory of 2952 1856 cmd.exe 43 PID 1856 wrote to memory of 2952 1856 cmd.exe 43 PID 1856 wrote to memory of 2952 1856 cmd.exe 43 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe"C:\Users\Admin\AppData\Local\Temp\9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1600 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HD4QXvbaDY.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2024
-
-
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\spoolsv.exe"C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\spoolsv.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2952
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\opengl32\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\PerfLogs\Admin\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\slc\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\vmictimeprovider\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\w32time\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
952KB
MD5407010d9dc0a256d4a4e2f41dae1b195
SHA1cfb447e45d1a2ace502a1ee9b97c5fffdf429a29
SHA25622dc170c714c028466eb9b3296d01098a40404d9c23965c3c34b73ad4eea651b
SHA512d8af702641e57802acbd147b63264a4fb88b423de06648737f15d2c44d946507b362f7d01f89703bf0a683a051b9330281d66a615d5ae015d5d02a9a3f37dbf1
-
Filesize
952KB
MD5fa2fda3605fcdbaf69212aa3edb9f0f4
SHA1f44fde95e3d9915f65fab24f48dcd4eb505a26da
SHA2569d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325
SHA512019536005222cf19bdcc3c018993e3be36b1149f3b7a27938f65194b59aed6eba256e5949a119c7b90c7fe441b2201b7093e19066821875d81051e1869fccfdd
-
Filesize
238B
MD5e6649f3bb960d7a4f60cb827307e8b8a
SHA19d322d29e740c9ed9e54b8cbbefb393804d87df1
SHA256317247f5a243537526346d4b853d529924134981bf65c9d20efe48cdfdca0b7e
SHA512570b23eec89d11ab7701fc66acf6ddfb3263fd16512acfb424c4f27c4c613b200aa54b2ab2f5cdee45749d6328e1027add70e5e5bd2304cdbe62662c24eb2d71
-
Filesize
952KB
MD5f2c8947ff5715607e60600e8b0c2d7ad
SHA1c09a5e93321967b24db485fe4a87b6441590729a
SHA25690175fbd33e1f3eef46242bb2aa4f171ceb7983b871db09cfbe0cddac578ad2b
SHA5123a63e50ac9107861b1a4c6977b73fc45be104fa41a2bf1f4e2ae2c92ec3076bc45b494abd023da20c20b70b83dc889bba051ffe1fa8a5b49b426c7928462ebe7
-
Filesize
952KB
MD5b053902810ab42b3631cc5cb29d08d6d
SHA1b593b5aeb34a5ccd509c5bdf98efe504cadb8cf8
SHA25665c07063323f35d608f92aa46c26871155f64bd930836741c6d8c022a8deee1d
SHA512c531b2eea5e6446d25e7d1f755c5eac82ebfd21444a81e59a37a0b1f89ceec8e2960b0164b7ce957b9f7acdfbf6b1a213b07670b57c88dd8bb62f749bcbf1f31