Analysis
-
max time kernel
119s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 10:31
Behavioral task
behavioral1
Sample
0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe
Resource
win10v2004-20241007-en
General
-
Target
0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe
-
Size
1.7MB
-
MD5
41ab31f7992973414712ec5526c1fc70
-
SHA1
bd1eb2471b1a16ef2e2bc29571c98b670de563f3
-
SHA256
0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012
-
SHA512
f3d90be2a0fbb838fbaf222ec6d64db5597e8104d53f863e0240cb8fd5bf72fb7f3c3d072b37e91967f80f4c298c295886eff89fd7b9831bbf8f2bc6d7120960
-
SSDEEP
49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:+THUxUoh1IF9gl2
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 39 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2752 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2684 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2668 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2576 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2688 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1304 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2564 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2896 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1852 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2772 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1836 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1984 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 564 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1776 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3056 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1160 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 892 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 940 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1488 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1124 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 664 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1092 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1316 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 904 2780 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 296 2780 schtasks.exe 31 -
resource yara_rule behavioral1/memory/2348-1-0x0000000000200000-0x00000000003C0000-memory.dmp dcrat behavioral1/files/0x00050000000192a1-27.dat dcrat behavioral1/files/0x000500000001a4ac-58.dat dcrat behavioral1/files/0x000c0000000174f8-113.dat dcrat behavioral1/files/0x0009000000019358-138.dat dcrat behavioral1/files/0x000700000001938e-149.dat dcrat behavioral1/memory/2708-270-0x00000000011B0000-0x0000000001370000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2628 powershell.exe 1572 powershell.exe 1516 powershell.exe 1448 powershell.exe 2024 powershell.exe 2584 powershell.exe 2556 powershell.exe 2880 powershell.exe 2368 powershell.exe 2772 powershell.exe 1352 powershell.exe 2084 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe -
Executes dropped EXE 2 IoCs
pid Process 2708 Idle.exe 2176 Idle.exe -
Drops file in Program Files directory 35 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\RCXE016.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\RCXF6B7.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files\Windows Sidebar\csrss.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files\Windows Sidebar\886983d96e3d3e 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files\Windows Portable Devices\7a0fd90576e088 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files\Internet Explorer\ja-JP\b75386f1303e64 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files\Windows Portable Devices\RCXF2AE.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\dwm.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files\Windows Portable Devices\explorer.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files\Windows Sidebar\csrss.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\RCXEBA6.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files\Windows Portable Devices\0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\wininit.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files\Windows Sidebar\RCXE017.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files\Windows Portable Devices\explorer.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\6cb0b6c459d5d3 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files\Windows Portable Devices\RCXE289.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\RCXF4B3.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files (x86)\Microsoft Sync Framework\Idle.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files\Windows Portable Devices\0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\RCXEBA5.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files\Windows Portable Devices\RCXF2AD.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\dwm.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\RCXF4B2.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\taskhost.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files\Windows Portable Devices\cf95946e6986b7 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files\Internet Explorer\ja-JP\taskhost.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files (x86)\Microsoft Sync Framework\6ccacd8608530f 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\RCXE4FA.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\RCXF6B6.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\Idle.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files (x86)\Common Files\DESIGNER\wininit.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Program Files (x86)\Common Files\DESIGNER\56085415360792 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files\Windows Portable Devices\RCXE288.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\RCXE4FB.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\en-US\taskhost.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File created C:\Windows\en-US\b75386f1303e64 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Windows\en-US\RCXF02B.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Windows\en-US\RCXF099.tmp 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe File opened for modification C:\Windows\en-US\taskhost.exe 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 39 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2684 schtasks.exe 564 schtasks.exe 1776 schtasks.exe 892 schtasks.exe 2752 schtasks.exe 2576 schtasks.exe 1304 schtasks.exe 1852 schtasks.exe 3056 schtasks.exe 664 schtasks.exe 904 schtasks.exe 2616 schtasks.exe 2772 schtasks.exe 3048 schtasks.exe 1316 schtasks.exe 2220 schtasks.exe 2248 schtasks.exe 2896 schtasks.exe 940 schtasks.exe 1972 schtasks.exe 2688 schtasks.exe 844 schtasks.exe 1124 schtasks.exe 1092 schtasks.exe 296 schtasks.exe 2300 schtasks.exe 2640 schtasks.exe 2924 schtasks.exe 1160 schtasks.exe 2228 schtasks.exe 1616 schtasks.exe 2700 schtasks.exe 2668 schtasks.exe 2564 schtasks.exe 2044 schtasks.exe 2452 schtasks.exe 1836 schtasks.exe 1984 schtasks.exe 1488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 2584 powershell.exe 2024 powershell.exe 2628 powershell.exe 2556 powershell.exe 1516 powershell.exe 1572 powershell.exe 2772 powershell.exe 2368 powershell.exe 2880 powershell.exe 1352 powershell.exe 2084 powershell.exe 1448 powershell.exe 2708 Idle.exe 2708 Idle.exe 2708 Idle.exe 2708 Idle.exe 2708 Idle.exe 2708 Idle.exe 2708 Idle.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe Token: SeDebugPrivilege 2584 powershell.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 2628 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 1516 powershell.exe Token: SeDebugPrivilege 1572 powershell.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 2368 powershell.exe Token: SeDebugPrivilege 2880 powershell.exe Token: SeDebugPrivilege 1352 powershell.exe Token: SeDebugPrivilege 2084 powershell.exe Token: SeDebugPrivilege 1448 powershell.exe Token: SeDebugPrivilege 2708 Idle.exe Token: SeDebugPrivilege 2176 Idle.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2584 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 71 PID 2348 wrote to memory of 2584 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 71 PID 2348 wrote to memory of 2584 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 71 PID 2348 wrote to memory of 2880 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 72 PID 2348 wrote to memory of 2880 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 72 PID 2348 wrote to memory of 2880 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 72 PID 2348 wrote to memory of 2556 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 73 PID 2348 wrote to memory of 2556 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 73 PID 2348 wrote to memory of 2556 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 73 PID 2348 wrote to memory of 2368 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 75 PID 2348 wrote to memory of 2368 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 75 PID 2348 wrote to memory of 2368 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 75 PID 2348 wrote to memory of 2024 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 77 PID 2348 wrote to memory of 2024 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 77 PID 2348 wrote to memory of 2024 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 77 PID 2348 wrote to memory of 2628 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 79 PID 2348 wrote to memory of 2628 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 79 PID 2348 wrote to memory of 2628 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 79 PID 2348 wrote to memory of 1572 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 81 PID 2348 wrote to memory of 1572 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 81 PID 2348 wrote to memory of 1572 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 81 PID 2348 wrote to memory of 1448 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 82 PID 2348 wrote to memory of 1448 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 82 PID 2348 wrote to memory of 1448 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 82 PID 2348 wrote to memory of 1516 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 84 PID 2348 wrote to memory of 1516 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 84 PID 2348 wrote to memory of 1516 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 84 PID 2348 wrote to memory of 2772 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 85 PID 2348 wrote to memory of 2772 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 85 PID 2348 wrote to memory of 2772 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 85 PID 2348 wrote to memory of 2084 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 86 PID 2348 wrote to memory of 2084 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 86 PID 2348 wrote to memory of 2084 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 86 PID 2348 wrote to memory of 1352 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 87 PID 2348 wrote to memory of 1352 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 87 PID 2348 wrote to memory of 1352 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 87 PID 2348 wrote to memory of 2732 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 95 PID 2348 wrote to memory of 2732 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 95 PID 2348 wrote to memory of 2732 2348 0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe 95 PID 2732 wrote to memory of 2484 2732 cmd.exe 97 PID 2732 wrote to memory of 2484 2732 cmd.exe 97 PID 2732 wrote to memory of 2484 2732 cmd.exe 97 PID 2732 wrote to memory of 2708 2732 cmd.exe 98 PID 2732 wrote to memory of 2708 2732 cmd.exe 98 PID 2732 wrote to memory of 2708 2732 cmd.exe 98 PID 2708 wrote to memory of 856 2708 Idle.exe 99 PID 2708 wrote to memory of 856 2708 Idle.exe 99 PID 2708 wrote to memory of 856 2708 Idle.exe 99 PID 2708 wrote to memory of 2712 2708 Idle.exe 100 PID 2708 wrote to memory of 2712 2708 Idle.exe 100 PID 2708 wrote to memory of 2712 2708 Idle.exe 100 PID 856 wrote to memory of 2176 856 WScript.exe 101 PID 856 wrote to memory of 2176 856 WScript.exe 101 PID 856 wrote to memory of 2176 856 WScript.exe 101 PID 2176 wrote to memory of 1708 2176 Idle.exe 102 PID 2176 wrote to memory of 1708 2176 Idle.exe 102 PID 2176 wrote to memory of 1708 2176 Idle.exe 102 PID 2176 wrote to memory of 2564 2176 Idle.exe 103 PID 2176 wrote to memory of 2564 2176 Idle.exe 103 PID 2176 wrote to memory of 2564 2176 Idle.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe"C:\Users\Admin\AppData\Local\Temp\0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe"1⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BHZBPNi6aG.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft Sync Framework\Idle.exe"C:\Program Files (x86)\Microsoft Sync Framework\Idle.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b18b173b-c4f6-4315-b3b7-56103a754604.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files (x86)\Microsoft Sync Framework\Idle.exe"C:\Program Files (x86)\Microsoft Sync Framework\Idle.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1eecb393-d38b-4b47-a7af-cd085ca93ec0.vbs"6⤵PID:1708
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7fa74715-4fb5-4105-88fc-b32051eaf7da.vbs"6⤵PID:2564
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\38e39b95-dd16-4ecb-bb0d-01e03264d9bb.vbs"4⤵PID:2712
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Sidebar\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N0" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Portable Devices\0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N0" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Portable Devices\0db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\DESIGNER\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Libraries\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Public\Libraries\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Libraries\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Documents\My Videos\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Users\Public\Documents\My Videos\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Documents\My Videos\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Windows\en-US\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\en-US\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Windows\en-US\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Portable Devices\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Portable Devices\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\Program Files\Internet Explorer\ja-JP\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\ja-JP\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Program Files\Internet Explorer\ja-JP\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Sync Framework\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD541ab31f7992973414712ec5526c1fc70
SHA1bd1eb2471b1a16ef2e2bc29571c98b670de563f3
SHA2560db13d5a3f1aa341822454bf1d807a06240479a15513185097217bdaf5f8b012
SHA512f3d90be2a0fbb838fbaf222ec6d64db5597e8104d53f863e0240cb8fd5bf72fb7f3c3d072b37e91967f80f4c298c295886eff89fd7b9831bbf8f2bc6d7120960
-
Filesize
1.7MB
MD549c85a5251c1f5db5183c52902b3c117
SHA14c07c204de6e0d4b852679414b145bfa935d0667
SHA256c756d3eb09bc009f8078a8b765a685ad19a46a28131492f6cdd84d7867651ce2
SHA5125515f82d3c878ef98d797cb4981d0bc2cbbd1404b4399d3da61f02dc22b255aaf7f8475ac7498f59777d64770cd467fc534b08392e3b1885a6b8f57383af0c6d
-
Filesize
732B
MD58adbeac67c0352482605c324b3e882fc
SHA16c7bfc90ebb2a755682f87192bfdd37abc2f4da6
SHA256ecc5f297e568b065d5f19e2f601945c967ecf2cd05f468464f206d85ca000060
SHA512158a2e9bc098346e974af4932864f5ba0c7341098324977dd22a5cfc25f9d3833979dd0a0a89d3bac038ead87b4a685ba1f7c312059e854d030a9f8a484ccfad
-
Filesize
508B
MD5c8b83927d56e24bb31c0de1bc20121cc
SHA1c00b630d708a73790f5fc284b6e4a008fe6ec3fe
SHA256faa7e217aeda13b28923fce17d51edb74d708b6c85bdfccc7e5ad67905722cfa
SHA512d1b7e5faeea2ce1614eaed8432742fa7ead62b719d0dd071dd325c309aa7417fdcf770c22edff75987c0c1c0d0c111bdd5693fe824b1bf6e5fb57912ad8aa1c6
-
Filesize
221B
MD57045fc0eef5c40d76b8a9db79ebc26f1
SHA1b358f469817abba9c8ab1449c1e49b0adff5ffcf
SHA256bdf1e535daad5abe3f4722f841dce7db14e7c1ed116697aabf20fc640bf0a72d
SHA512e0d7850c8592a5e6854d6b5ea19496c6f85794eae8f330cbec12ef8d353d9bf5c4924ba75ba55666aa1553258343c64fd1adfa0734a8c60a88a0a58b51322731
-
Filesize
732B
MD56c6d9877c3d6b29ce5b873aecbb3e7c1
SHA1829e3a86f3d906b860d6dace27955c854b2f1ec9
SHA256b856a2ed5007b2d2ba307d01bc844002dacf2612ab78d0dd4a06c48fa10e2017
SHA512cfeed9e258c2291413dee2b3d76b61fcfe173caa6f97d7aa1cde49ff1c673e12451335a807658a9f06a885f162b0063819876e2088d731029fcbd0fd1137d47f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b036951fc518ecf218deb64120dfcee7
SHA1538d0def943bcbb86c707a152b6885afe285da04
SHA25623133d28f40c0a66d00e840265a14f37967762df72c0947da9e34eb96c70e148
SHA512bb52feaa782e17641b70b077fec2403e6e73d38662885bfe99cecde48d322a42912ffa1ffc0a5ace8749b62b08f24aafa2208d67ef816d0a7391118f8ceba5ee
-
Filesize
1.7MB
MD5d4c4fbad0ea4c39260010d502a8bd109
SHA1818a422e8d3e890444aea0e35523a1476dd23ca4
SHA2566c9b4070c92f1f3bd53a377ad2ebe75531691792a993359ddec9ab09ea7eacbb
SHA5122646ce6a291eef921480b96146961a02fce866928dc56585c22d7b23d6020f6c3f9b2a2bc139b19b57ee16e2f0a8bdf3e3283e22fb73306c6e92030def46b392
-
Filesize
1.7MB
MD5bca9e192dd319bb3ab1a2a25320aa1df
SHA19be6d920db9e0467fd7e5b020e3a56cc3fde0200
SHA2563828ddef4c3a37f0176b5b6e68bc8d3a5585e872218a5830a40b4a4e1ab0ae5d
SHA512c044d168347c90103d18978972a42ecde9081859e0ed934701ffa517270fd8a2f8adcbdbdf05dc3043441a6dc7ec0013c61f6d51b7350e12e4d160fe8191f4c5
-
Filesize
1.7MB
MD5cc8cffdde64925ca9bdfadfdbc49d2f4
SHA12a9f3a473c2e8c14caba7a3dee239ed9dfc102c0
SHA2560b74a2ad56740a214dc74950045c55f3f3a5b969a9cc2e1bce08e173e44d7caf
SHA51220af2f88936f28b2f6c12f5f87b3e3ceabfe25395101e9b264bb83faf169f9b1282d48fd65b58bb8931a71ebddb0f3768a8d430e532e52fe6541ecf43a1255e5