Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 03:58
Behavioral task
behavioral1
Sample
9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe
Resource
win10v2004-20241007-en
General
-
Target
9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe
-
Size
952KB
-
MD5
fa2fda3605fcdbaf69212aa3edb9f0f4
-
SHA1
f44fde95e3d9915f65fab24f48dcd4eb505a26da
-
SHA256
9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325
-
SHA512
019536005222cf19bdcc3c018993e3be36b1149f3b7a27938f65194b59aed6eba256e5949a119c7b90c7fe441b2201b7093e19066821875d81051e1869fccfdd
-
SSDEEP
24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.CppWinrt\\SearchApp.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\tier2punctuations\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\ApplicationFrame\\RuntimeBroker.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.CppWinrt\\SearchApp.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\tier2punctuations\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\ApplicationFrame\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\AppVStreamingUX\\fontdrvhost.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.CppWinrt\\SearchApp.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\tier2punctuations\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\ApplicationFrame\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\AppVStreamingUX\\fontdrvhost.exe\", \"C:\\Windows\\System32\\tcblaunch\\SppExtComObj.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.CppWinrt\\SearchApp.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\tier2punctuations\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\ApplicationFrame\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\AppVStreamingUX\\fontdrvhost.exe\", \"C:\\Windows\\System32\\tcblaunch\\SppExtComObj.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Modules\\RuntimeBroker.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.CppWinrt\\SearchApp.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\tier2punctuations\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\ApplicationFrame\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\AppVStreamingUX\\fontdrvhost.exe\", \"C:\\Windows\\System32\\tcblaunch\\SppExtComObj.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Modules\\RuntimeBroker.exe\", \"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.ProxyStub\\SearchApp.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.CppWinrt\\SearchApp.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.CppWinrt\\SearchApp.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\RuntimeBroker.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.CppWinrt\\SearchApp.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\tier2punctuations\\RuntimeBroker.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3860 1968 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3744 1968 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 684 1968 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3596 1968 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2364 1968 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4504 1968 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 620 1968 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 1968 schtasks.exe 82 -
UAC bypass 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe -
resource yara_rule behavioral2/memory/916-1-0x0000000000650000-0x0000000000744000-memory.dmp dcrat behavioral2/files/0x0008000000023bb7-20.dat dcrat behavioral2/files/0x000d000000023bfb-65.dat dcrat behavioral2/files/0x0009000000023bfc-76.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Executes dropped EXE 1 IoCs
pid Process 1056 RuntimeBroker.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\tier2punctuations\\RuntimeBroker.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\ApplicationFrame\\RuntimeBroker.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\System32\\tcblaunch\\SppExtComObj.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.CppWinrt\\SearchApp.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\RuntimeBroker.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\tier2punctuations\\RuntimeBroker.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\ApplicationFrame\\RuntimeBroker.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\System32\\AppVStreamingUX\\fontdrvhost.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Modules\\RuntimeBroker.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Modules\\RuntimeBroker.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.ProxyStub\\SearchApp.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.CppWinrt\\SearchApp.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\RuntimeBroker.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\System32\\AppVStreamingUX\\fontdrvhost.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\System32\\tcblaunch\\SppExtComObj.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.ProxyStub\\SearchApp.exe\"" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Checks whether UAC is enabled 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\System32\tier2punctuations\RCXA222.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\ApplicationFrame\RuntimeBroker.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\AppVStreamingUX\RCXA727.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\AppVStreamingUX\RCXA738.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\AppVStreamingUX\fontdrvhost.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\tier2punctuations\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\ApplicationFrame\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\ApplicationFrame\RuntimeBroker.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\ApplicationFrame\RCXA4A4.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\tcblaunch\e1ef82546f0b02b7e974f28047f3788b1128cce1 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\tier2punctuations\RCXA2A0.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\tcblaunch\RCXA93C.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\tier2punctuations\RuntimeBroker.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\AppVStreamingUX\5b884080fd4f94e2695da25c503f9e33b9605b83 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\tier2punctuations\RuntimeBroker.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\ApplicationFrame\RCXA522.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\tcblaunch\RCXA93D.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\System32\tcblaunch\SppExtComObj.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\AppVStreamingUX\fontdrvhost.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\System32\tcblaunch\SppExtComObj.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\RuntimeBroker.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\RCXABC0.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\RuntimeBroker.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\RCXA01D.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\RCXA01C.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\RCXABBF.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\RuntimeBroker.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\RuntimeBroker.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.ProxyStub\RCXADE5.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.CppWinrt\SearchApp.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.CppWinrt\38384e6a620884a6b69bcc56f80d556f9200171c 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.ProxyStub\38384e6a620884a6b69bcc56f80d556f9200171c 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.CppWinrt\RCX9E17.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.CppWinrt\RCX9E18.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.ProxyStub\RCXADD4.tmp 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.ProxyStub\SearchApp.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.CppWinrt\SearchApp.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.ProxyStub\SearchApp.exe 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3744 schtasks.exe 684 schtasks.exe 3596 schtasks.exe 2364 schtasks.exe 4504 schtasks.exe 620 schtasks.exe 1936 schtasks.exe 3860 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 916 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 916 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Token: SeDebugPrivilege 1056 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 916 wrote to memory of 2316 916 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe 91 PID 916 wrote to memory of 2316 916 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe 91 PID 2316 wrote to memory of 628 2316 cmd.exe 93 PID 2316 wrote to memory of 628 2316 cmd.exe 93 PID 2316 wrote to memory of 1056 2316 cmd.exe 94 PID 2316 wrote to memory of 1056 2316 cmd.exe 94 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe"C:\Users\Admin\AppData\Local\Temp\9d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:916 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LUotzgml9v.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:628
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\RuntimeBroker.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\RuntimeBroker.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1056
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.CppWinrt\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\tier2punctuations\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\ApplicationFrame\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\AppVStreamingUX\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\tcblaunch\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.ProxyStub\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1936
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237B
MD5e526d21df15bc2f18c056eb634f4e8c5
SHA186fa6e9ca67d3a412fffc1f23346d96507141dd7
SHA2569c511923567b250c735d7bfef8d946f966ae01d32d9bdedb80bab78fddd2af89
SHA5126d3f53c3b9534bccfe69feb5b4e159f9bcd83f8783a7b9520669b12785413d7505d04d0b3c47fd648a4b5f04b56811615077e92ddf9b4a5e633f1d37d7c5441c
-
Filesize
952KB
MD5fa2fda3605fcdbaf69212aa3edb9f0f4
SHA1f44fde95e3d9915f65fab24f48dcd4eb505a26da
SHA2569d6543c22a9d71de6a5a08d0189944fd98da698e917662fac24f98f2e08e2325
SHA512019536005222cf19bdcc3c018993e3be36b1149f3b7a27938f65194b59aed6eba256e5949a119c7b90c7fe441b2201b7093e19066821875d81051e1869fccfdd
-
Filesize
952KB
MD5c265bfbb4436331de93784a0b581df66
SHA11f27a85caeedbca30209ae8b090455187c081754
SHA2564d7f244f0d91322d4f8c756f5e18108c966b61cb2748ddcf35f6c3fd1f9d970b
SHA512f29df96486395b9cdc66563ef5a06d1350e67f05391fbf5cffe64b57dd2192ffca6514b15262f13be758b98acff29dd22f6e485d81e290e7fead1cab71c50a32
-
Filesize
952KB
MD55be0542c822d74bad05e8132f1878025
SHA1707d350ed7dcb4caf50c25e93b46c423b5584879
SHA256a4a0af776f0276e10478b1a64f5212b8b01e369193456f5167336a039359dfbe
SHA51267a0a19760bbd4e0ab2460f0b45c2a3e465bca1dcff7d31b35e44faa6f7f8efad64f248bfadcfa19adf0fa81e7db7bd23cb495adbd8d4ca4976908c56410ffc4