Analysis

  • max time kernel
    119s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 07:38

General

  • Target

    95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe

  • Size

    2.2MB

  • MD5

    ba5102fee3b188bb6ac65068ec18d95d

  • SHA1

    59a111a9ab515d690995496967de195eb23b097c

  • SHA256

    95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27

  • SHA512

    2dfe580f3e278431fef83d2c33c19e8af33ba958a7d6abc4cce571b202a64a06d7c54fda635b9b649d6bb6090ef0370063cf35cd5e6688dc435db6e6fe07cc37

  • SSDEEP

    49152:ssSHlG56vO0T3/Nh/ptuw/C3TqGaDxr1NcWTMUvifC:sLlK6d3/Nh/bV/Oq3Dxp2RUGC

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 18 IoCs
  • Process spawned unexpected child process 54 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 9 IoCs
  • DCRat payload 10 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 34 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in Program Files directory 41 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 54 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • System policy modification 1 TTPs 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe
    "C:\Users\Admin\AppData\Local\Temp\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Drops file in Drivers directory
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1556
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vYNrLnHEtP.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1596
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:3416
        • C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\wininit.exe
          "C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\wininit.exe"
          3⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3628
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d772d479-6880-4c55-988c-7b558b348adf.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2944
            • C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\wininit.exe
              "C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\wininit.exe"
              5⤵
              • UAC bypass
              • Checks computer location settings
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:3864
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1a9a046-02e7-4a41-891b-b7550999dfe0.vbs"
                6⤵
                  PID:2536
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4589ec31-fc25-4a7a-8682-044aeb8bbf8b.vbs"
                  6⤵
                    PID:2116
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d74fc204-8c2b-4386-8929-cb220dcef68f.vbs"
                4⤵
                  PID:4016
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3344
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3540
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:688
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e279" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Mail\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1936
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4680
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e279" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Mail\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1756
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\7-Zip\RuntimeBroker.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2556
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\7-Zip\RuntimeBroker.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3324
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files\7-Zip\RuntimeBroker.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3972
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Microsoft\upfc.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:5060
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\upfc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1864
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Microsoft\upfc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2372
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e279" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Music\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3052
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27" /sc ONLOGON /tr "'C:\Users\Public\Music\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2368
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e279" /sc MINUTE /mo 8 /tr "'C:\Users\Public\Music\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1988
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\SearchApp.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2292
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\SearchApp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:404
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\SearchApp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3116
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\wininit.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2588
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\wininit.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2416
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\wininit.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:5088
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e279" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2512
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27" /sc ONLOGON /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3648
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e279" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3976
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Recent\RuntimeBroker.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2536
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Admin\Recent\RuntimeBroker.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4380
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Recent\RuntimeBroker.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2932
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4124
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2140
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4324
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Defender\it-IT\dllhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2812
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\it-IT\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3492
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Defender\it-IT\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2112
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\sppsvc.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1620
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2772
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2636
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Windows\DigitalLocker\en-US\fontdrvhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4724
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\DigitalLocker\en-US\fontdrvhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:412
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Windows\DigitalLocker\en-US\fontdrvhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4896
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e279" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Defender\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:5068
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2308
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e279" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Defender\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3416
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3692
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2624
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3924
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:60
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1636
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1572
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Media Player\de-DE\dllhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1696
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\de-DE\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1536
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Media Player\de-DE\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4604
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Downloads\Idle.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1604
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Public\Downloads\Idle.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3156
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Downloads\Idle.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1056

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\SearchApp.exe

            Filesize

            2.2MB

            MD5

            b1a36621253ecc69f90e9c4a19a4ee30

            SHA1

            e641d142ccd679d4133d80db12385ccf586a85ed

            SHA256

            5ebf8c4c9331143477c3cf2722530f644c32598f066ebb24b59a02051b57a48f

            SHA512

            f41aeaf097a275843548f85807ec0fb47b680ed15ca81ff2f7eebea04cc49e2527aa74687e59b47049aaef8e1b3892a0af6f1942c9c5ee84946d3c6d9bc7f8dd

          • C:\Program Files (x86)\Microsoft\Edge\Application\sppsvc.exe

            Filesize

            2.2MB

            MD5

            4273c0c34a28d2ac6bfa6d72bb81c99b

            SHA1

            db48dfcb8e09ec273a8167825b411c9575f7b61f

            SHA256

            e5dcdd27f448d7fe70cc9fb35dd565bd672bde1d41040955e20cdced2a36cdf2

            SHA512

            2a7ab85e96367e2e0b2ccfa751a76d7cd5c18acfba00bdf42330d0ae2f1bda67cc58110cf7eb1fe805cd42618b63215bd44c7f5adb086a68c7c96bd9ef250966

          • C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\wininit.exe

            Filesize

            2.2MB

            MD5

            b4ba422f8d337676c1306c0d776329a2

            SHA1

            8df936301f27f88935f13299121eb75070b480e4

            SHA256

            15070283511f878c8efc1a340f06f9786f11bb48abfe1d90384fe7d54d3142fb

            SHA512

            cac22a7689ec73c04d246e2e38748850a9cf785a0fd921695fbdbddddfc94212e39cdc26e2d16cdba64a65dff1a07dbf53844748086f5784de977dc9ff8c6cd0

          • C:\Program Files (x86)\Windows Defender\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe

            Filesize

            2.2MB

            MD5

            fe782fce338bacfa942c794dd991f41b

            SHA1

            247789a930ae1c11906146a62e70d15d9e32dd7d

            SHA256

            0475fd39060220d1b6b666f308a6d5f18cbb3d8b7269a9a939ce53238e7a908d

            SHA512

            d11a337084d340bc699633463c82794666bb859b73a95310a2e55795f8ecc72814257c31eb341e73c14fbba02a97286fa9c098cffc5323c736b7aeef3e3a791a

          • C:\ProgramData\Microsoft\upfc.exe

            Filesize

            2.2MB

            MD5

            8e66ab736b18408d8643e6b5c3319671

            SHA1

            5f8033f5d8b28e4bedce1f8f5844b5b529e97b1e

            SHA256

            0b46cabe71cf8d84b6e510828bf49736c958122cef046a1f0fa8d3621b403af0

            SHA512

            df0c3ff004135ddd5fce5d1d29c51ff1c9f0646a46052f7f3bc71362bc24a9cdc5f98f768cbdb713ed574b30feb367f3fe02418e62cc32ea89009dfde6b6e1d9

          • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe

            Filesize

            2.2MB

            MD5

            c6282cb42fb2e0ac903fe3701136b5cc

            SHA1

            9d9ab960bd9fae4bf14483cd3b15cd8f4c4a5239

            SHA256

            5f6b67f7324da31bed9f0f038565d93bf8b8b152ddd8d29c92ca70067dace964

            SHA512

            aa5e3716eae3cd4e80f0a57b3563133e7cfebfb8caeb3edff7e792155591fea876cddd4f48ebb313ba4d1f90057f4649b60c777a3c512b20d1803998e0156594

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\wininit.exe.log

            Filesize

            1KB

            MD5

            49b64127208271d8f797256057d0b006

            SHA1

            b99bd7e2b4e9ed24de47fb3341ea67660b84cca1

            SHA256

            2a5d403a2e649d8eceef8f785eeb0f6d33888ec6bbf251b3c347e34cb32b1e77

            SHA512

            f7c728923c893dc9bc88ad2159e0abcda41e1b40ff7e7756e6252d135ed238a2248a2662b3392449836dd1b0b580f0c866cc33e409527484fe4602e3d3f10e3e

          • C:\Users\Admin\AppData\Local\Temp\d74fc204-8c2b-4386-8929-cb220dcef68f.vbs

            Filesize

            527B

            MD5

            64f33f3369108ec1466a990136863892

            SHA1

            3ea987fc81710d4c343b8e7a6974a83e6dcaca2e

            SHA256

            13fa3dd23918b659771ef05b7c3c75af29152483de84579389360a20ef80a4cb

            SHA512

            4c6c87ce4358039ec6e0a763e47494d2c8138efe1733e5b466b71bcf88e50bf2b706d195597ba118ed1840905f1d6dd6cc20d11d40124dc10d9622518c86a534

          • C:\Users\Admin\AppData\Local\Temp\d772d479-6880-4c55-988c-7b558b348adf.vbs

            Filesize

            751B

            MD5

            697dc2a04c8ea040d830dd744ad94e2f

            SHA1

            ae57ad3cc8a1d6c3e9d9ef3141ac12af80c55b30

            SHA256

            be3cd5990207223bd0a4f53c06f0969ec0d5146fd2afa62438b7eaf1b8942f68

            SHA512

            2123e18b99ed00966f7f5aaa97867f0b10c47e3eed7bdd7835084f95e7e95086235739e2676ddebc217d3b83898c1616ea3d1099dfae6b9824a19488ceec110c

          • C:\Users\Admin\AppData\Local\Temp\f1a9a046-02e7-4a41-891b-b7550999dfe0.vbs

            Filesize

            751B

            MD5

            f283c4577b6a9c993eef05a69f11b7d0

            SHA1

            f4c12438c71560f44f9851f9c309af5b531b8d30

            SHA256

            f007051c0127959ce732ba342d391af5e210a590f1632d5a711e58b1446b8c25

            SHA512

            e008f899fb2686cad778a8e869eecf8718a1302ce07da880de1b3d7e4c17ccf609b87e27a320844f83939c2fc30d852d12d7400c09c1ba910fc2f50ad95d201a

          • C:\Users\Admin\AppData\Local\Temp\vYNrLnHEtP.bat

            Filesize

            240B

            MD5

            ea67a8aa2ba0d5679022de58990b943e

            SHA1

            ccc64481ce92429125ffeb5887bdcc4e23296f74

            SHA256

            0305d38226fe78a0088254bef52445367061d60ee19bb500946002f89c65f3d1

            SHA512

            07d5b69121a7557beb49e077d94219ef8bbe3482e6cf870a506394c808e881c23b1c3722f5da1be3041e2a2e9b460b7ec110c57660be6be9245ee64a184ca9f3

          • C:\Users\Public\Music\95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27.exe

            Filesize

            2.2MB

            MD5

            ba5102fee3b188bb6ac65068ec18d95d

            SHA1

            59a111a9ab515d690995496967de195eb23b097c

            SHA256

            95c8a2a9b99890e2398ab49937de11179c816b92ca6ab2ba269f1f8598675e27

            SHA512

            2dfe580f3e278431fef83d2c33c19e8af33ba958a7d6abc4cce571b202a64a06d7c54fda635b9b649d6bb6090ef0370063cf35cd5e6688dc435db6e6fe07cc37

          • C:\Windows\DigitalLocker\en-US\fontdrvhost.exe

            Filesize

            2.2MB

            MD5

            5d37f0df3bd5b140f724026af9311a97

            SHA1

            83b5cd9acdcdfdb75ac9893f2f32db0c287eec30

            SHA256

            604d21c1ebf293aba3a1811394630c0e6b93b8f3dff3d3e295a53faf0d60ef3e

            SHA512

            b7aaf2917f4a7ec12daf5a22e1d1ec9b30792e02be938869acdd8bd0fcf6b079d548ebc9e92c24a7ca9fdf85901f0b07022a8f8b7f97a2ee364910457040734e

          • memory/1556-12-0x000000001B620000-0x000000001B630000-memory.dmp

            Filesize

            64KB

          • memory/1556-13-0x000000001B630000-0x000000001B63A000-memory.dmp

            Filesize

            40KB

          • memory/1556-15-0x000000001B650000-0x000000001B658000-memory.dmp

            Filesize

            32KB

          • memory/1556-16-0x000000001B660000-0x000000001B66C000-memory.dmp

            Filesize

            48KB

          • memory/1556-17-0x000000001B670000-0x000000001B678000-memory.dmp

            Filesize

            32KB

          • memory/1556-19-0x000000001BCE0000-0x000000001BCF2000-memory.dmp

            Filesize

            72KB

          • memory/1556-20-0x000000001C240000-0x000000001C768000-memory.dmp

            Filesize

            5.2MB

          • memory/1556-21-0x000000001BD10000-0x000000001BD1C000-memory.dmp

            Filesize

            48KB

          • memory/1556-22-0x000000001BD20000-0x000000001BD2C000-memory.dmp

            Filesize

            48KB

          • memory/1556-23-0x000000001BD30000-0x000000001BD3C000-memory.dmp

            Filesize

            48KB

          • memory/1556-28-0x000000001BF80000-0x000000001BF8C000-memory.dmp

            Filesize

            48KB

          • memory/1556-27-0x000000001BF70000-0x000000001BF7E000-memory.dmp

            Filesize

            56KB

          • memory/1556-30-0x000000001BFA0000-0x000000001BFAC000-memory.dmp

            Filesize

            48KB

          • memory/1556-31-0x00007FF940710000-0x00007FF9411D1000-memory.dmp

            Filesize

            10.8MB

          • memory/1556-29-0x000000001BF90000-0x000000001BF98000-memory.dmp

            Filesize

            32KB

          • memory/1556-26-0x000000001BE60000-0x000000001BE68000-memory.dmp

            Filesize

            32KB

          • memory/1556-34-0x00007FF940710000-0x00007FF9411D1000-memory.dmp

            Filesize

            10.8MB

          • memory/1556-25-0x000000001BE50000-0x000000001BE5E000-memory.dmp

            Filesize

            56KB

          • memory/1556-24-0x000000001BE40000-0x000000001BE4A000-memory.dmp

            Filesize

            40KB

          • memory/1556-14-0x000000001B640000-0x000000001B64C000-memory.dmp

            Filesize

            48KB

          • memory/1556-0-0x00007FF940713000-0x00007FF940715000-memory.dmp

            Filesize

            8KB

          • memory/1556-11-0x000000001B610000-0x000000001B618000-memory.dmp

            Filesize

            32KB

          • memory/1556-144-0x00007FF940713000-0x00007FF940715000-memory.dmp

            Filesize

            8KB

          • memory/1556-5-0x0000000002AD0000-0x0000000002AEC000-memory.dmp

            Filesize

            112KB

          • memory/1556-6-0x000000001BC90000-0x000000001BCE0000-memory.dmp

            Filesize

            320KB

          • memory/1556-167-0x00007FF940710000-0x00007FF9411D1000-memory.dmp

            Filesize

            10.8MB

          • memory/1556-183-0x00007FF940710000-0x00007FF9411D1000-memory.dmp

            Filesize

            10.8MB

          • memory/1556-7-0x0000000002AB0000-0x0000000002AB8000-memory.dmp

            Filesize

            32KB

          • memory/1556-221-0x00007FF940710000-0x00007FF9411D1000-memory.dmp

            Filesize

            10.8MB

          • memory/1556-10-0x0000000002B20000-0x0000000002B2C000-memory.dmp

            Filesize

            48KB

          • memory/1556-8-0x0000000002AF0000-0x0000000002B00000-memory.dmp

            Filesize

            64KB

          • memory/1556-281-0x00007FF940710000-0x00007FF9411D1000-memory.dmp

            Filesize

            10.8MB

          • memory/1556-9-0x0000000002B00000-0x0000000002B16000-memory.dmp

            Filesize

            88KB

          • memory/1556-1-0x0000000000750000-0x000000000097E000-memory.dmp

            Filesize

            2.2MB

          • memory/1556-4-0x0000000001250000-0x000000000125E000-memory.dmp

            Filesize

            56KB

          • memory/1556-3-0x0000000001240000-0x000000000124E000-memory.dmp

            Filesize

            56KB

          • memory/1556-2-0x00007FF940710000-0x00007FF9411D1000-memory.dmp

            Filesize

            10.8MB

          • memory/3628-286-0x0000000000380000-0x00000000005AE000-memory.dmp

            Filesize

            2.2MB