Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2025, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
51ee1c43b8c4c83a1ee89f486a002e8a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
51ee1c43b8c4c83a1ee89f486a002e8a.exe
Resource
win10v2004-20241007-en
General
-
Target
51ee1c43b8c4c83a1ee89f486a002e8a.exe
-
Size
1.9MB
-
MD5
51ee1c43b8c4c83a1ee89f486a002e8a
-
SHA1
ac3559b85e9f8328fc661c4f7dc17d464aa461fa
-
SHA256
2c359780ff1c635fd866c9f81e53ea9a95c0af2c9b303aec259675882dd13253
-
SHA512
3191012d5078beb815ff733c3981545858a30e5051ffbbb7b4bb1dff5bab82004809a0d407af0d8312b241c05738591d7a83ce2e01e0c9b2e8f9d325ca9649d6
-
SSDEEP
49152:SIsY+oZb+wZGTt6IDmYYg+tfxXi1Mq39V:SIg6IDatJXbM9V
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\uk-UA\\dllhost.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\uk-UA\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\SearchApp.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\uk-UA\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\SearchApp.exe\", \"C:\\Windows\\PLA\\Rules\\en-US\\spoolsv.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\uk-UA\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\SearchApp.exe\", \"C:\\Windows\\PLA\\Rules\\en-US\\spoolsv.exe\", \"C:\\Users\\Default User\\wininit.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\uk-UA\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\SearchApp.exe\", \"C:\\Windows\\PLA\\Rules\\en-US\\spoolsv.exe\", \"C:\\Users\\Default User\\wininit.exe\", \"C:\\Users\\Default User\\lsass.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\uk-UA\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\SearchApp.exe\", \"C:\\Windows\\PLA\\Rules\\en-US\\spoolsv.exe\", \"C:\\Users\\Default User\\wininit.exe\", \"C:\\Users\\Default User\\lsass.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\51ee1c43b8c4c83a1ee89f486a002e8a.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4012 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 836 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2216 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4864 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4828 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5060 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4340 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3916 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4440 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1040 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4064 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1216 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3708 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2968 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 944 5004 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3876 5004 schtasks.exe 85 -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2108 powershell.exe 1152 powershell.exe 4992 powershell.exe 4820 powershell.exe 620 powershell.exe 1844 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 51ee1c43b8c4c83a1ee89f486a002e8a.exe -
Executes dropped EXE 1 IoCs
pid Process 5060 SearchApp.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\uk-UA\\dllhost.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Users\\Public\\Pictures\\SearchApp.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Users\\Public\\Pictures\\SearchApp.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\PLA\\Rules\\en-US\\spoolsv.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Users\\Default User\\wininit.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Users\\Default User\\wininit.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Default User\\lsass.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\uk-UA\\dllhost.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Default User\\lsass.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\51ee1c43b8c4c83a1ee89f486a002e8a = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\51ee1c43b8c4c83a1ee89f486a002e8a.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\51ee1c43b8c4c83a1ee89f486a002e8a = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\51ee1c43b8c4c83a1ee89f486a002e8a.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\PLA\\Rules\\en-US\\spoolsv.exe\"" 51ee1c43b8c4c83a1ee89f486a002e8a.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 ipinfo.io 15 ipinfo.io 16 ipinfo.io 45 ipinfo.io -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC35D020B3D3643D4969AC7693AFD66EE.TMP csc.exe File created \??\c:\Windows\System32\-63gkj.exe csc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\PLA\Rules\en-US\spoolsv.exe 51ee1c43b8c4c83a1ee89f486a002e8a.exe File created C:\Windows\PLA\Rules\en-US\f3b6ecef712a24 51ee1c43b8c4c83a1ee89f486a002e8a.exe File created C:\Windows\uk-UA\dllhost.exe 51ee1c43b8c4c83a1ee89f486a002e8a.exe File created C:\Windows\uk-UA\5940a34987c991 51ee1c43b8c4c83a1ee89f486a002e8a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4060 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 51ee1c43b8c4c83a1ee89f486a002e8a.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4060 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4828 schtasks.exe 5060 schtasks.exe 3916 schtasks.exe 3708 schtasks.exe 2328 schtasks.exe 2216 schtasks.exe 2676 schtasks.exe 1040 schtasks.exe 2968 schtasks.exe 4864 schtasks.exe 4064 schtasks.exe 944 schtasks.exe 4012 schtasks.exe 836 schtasks.exe 4340 schtasks.exe 4440 schtasks.exe 1216 schtasks.exe 3876 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe Token: SeDebugPrivilege 1844 powershell.exe Token: SeDebugPrivilege 4992 powershell.exe Token: SeDebugPrivilege 4820 powershell.exe Token: SeDebugPrivilege 1152 powershell.exe Token: SeDebugPrivilege 2108 powershell.exe Token: SeDebugPrivilege 620 powershell.exe Token: SeDebugPrivilege 5060 SearchApp.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2916 wrote to memory of 5000 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 89 PID 2916 wrote to memory of 5000 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 89 PID 5000 wrote to memory of 2340 5000 csc.exe 91 PID 5000 wrote to memory of 2340 5000 csc.exe 91 PID 2916 wrote to memory of 620 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 107 PID 2916 wrote to memory of 620 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 107 PID 2916 wrote to memory of 1844 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 108 PID 2916 wrote to memory of 1844 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 108 PID 2916 wrote to memory of 2108 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 109 PID 2916 wrote to memory of 2108 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 109 PID 2916 wrote to memory of 4820 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 110 PID 2916 wrote to memory of 4820 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 110 PID 2916 wrote to memory of 4992 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 111 PID 2916 wrote to memory of 4992 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 111 PID 2916 wrote to memory of 1152 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 112 PID 2916 wrote to memory of 1152 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 112 PID 2916 wrote to memory of 1704 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 119 PID 2916 wrote to memory of 1704 2916 51ee1c43b8c4c83a1ee89f486a002e8a.exe 119 PID 1704 wrote to memory of 2872 1704 cmd.exe 121 PID 1704 wrote to memory of 2872 1704 cmd.exe 121 PID 1704 wrote to memory of 4060 1704 cmd.exe 122 PID 1704 wrote to memory of 4060 1704 cmd.exe 122 PID 1704 wrote to memory of 5060 1704 cmd.exe 124 PID 1704 wrote to memory of 5060 1704 cmd.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\51ee1c43b8c4c83a1ee89f486a002e8a.exe"C:\Users\Admin\AppData\Local\Temp\51ee1c43b8c4c83a1ee89f486a002e8a.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5lh5cjkb\5lh5cjkb.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE177.tmp" "c:\Windows\System32\CSC35D020B3D3643D4969AC7693AFD66EE.TMP"3⤵PID:2340
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\uk-UA\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Pictures\SearchApp.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PLA\Rules\en-US\spoolsv.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\wininit.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\lsass.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\51ee1c43b8c4c83a1ee89f486a002e8a.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\y7L7EnP0rm.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2872
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4060
-
-
C:\Users\Public\Pictures\SearchApp.exe"C:\Users\Public\Pictures\SearchApp.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Windows\uk-UA\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\uk-UA\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\uk-UA\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Pictures\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\Public\Pictures\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Pictures\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Windows\PLA\Rules\en-US\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\PLA\Rules\en-US\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Windows\PLA\Rules\en-US\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Default User\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "51ee1c43b8c4c83a1ee89f486a002e8a5" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Local\Temp\51ee1c43b8c4c83a1ee89f486a002e8a.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "51ee1c43b8c4c83a1ee89f486a002e8a" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\51ee1c43b8c4c83a1ee89f486a002e8a.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "51ee1c43b8c4c83a1ee89f486a002e8a5" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Local\Temp\51ee1c43b8c4c83a1ee89f486a002e8a.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3876
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a43e653ffb5ab07940f4bdd9cc8fade4
SHA1af43d04e3427f111b22dc891c5c7ee8a10ac4123
SHA256c4c53abb13e99475aebfbe9fec7a8fead81c14c80d9dcc2b81375304f3a683fe
SHA51262a97e95e1f19a8d4302847110dae44f469877eed6aa8ea22345c6eb25ee220e7d310fa0b7ec5df42356815421c0af7c46a0f1fee8933cc446641800eda6cd1b
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
1KB
MD5630abde914d1a8c463ccba08967ea1fa
SHA15a88a4ee117b562a82dff55d32c9f9d1b85f7dce
SHA25618ced8ed7b818edddf532fb20d8ec59c5b85bd5ea62864d805458084ab262c4c
SHA512cc1b58fde735bf79c422e6f362eccd7fcb84cef3f6c9583c637398c1e36a9551093106458d3da41244bc8c93be08a5516993db13387685814caf3fe1817ce501
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
166B
MD564f5c146a5480560d0208f5292c92c8b
SHA168e14b40311da23a49d9ba258d8bc0893ba009a0
SHA256005fef8e2063ef6272fbe8f370d39b9ffca91cac0570a028de6ccc79c3480cb4
SHA5129bfb115cd1c1d45ce6ab0b5eaa5d921b25854562cf5b20df27c03829f445fb82f30d835a8e87ee69fd0bf757c525dc6085418621f459786ceba1b7bb757d1f73
-
Filesize
1.9MB
MD551ee1c43b8c4c83a1ee89f486a002e8a
SHA1ac3559b85e9f8328fc661c4f7dc17d464aa461fa
SHA2562c359780ff1c635fd866c9f81e53ea9a95c0af2c9b303aec259675882dd13253
SHA5123191012d5078beb815ff733c3981545858a30e5051ffbbb7b4bb1dff5bab82004809a0d407af0d8312b241c05738591d7a83ce2e01e0c9b2e8f9d325ca9649d6
-
Filesize
360B
MD504a822521f6474f10cef31de4c4b3bbc
SHA100090be09fd6bb2dbc6eb899e502980144626818
SHA256d0bca057f4c6e1d38cf7e0ebf7bbce9bbfe27b1e336e037cc0fd74e4aee59346
SHA51276a225e3216d3be674380ebb9ff08f79f9349b525d2e523b72cf358d1c22d0b86f3b6f0ba955f594fc97ea7d4e70a26fceb748baff13f43bb7b7a412e3a9e9fa
-
Filesize
235B
MD58267b944e1ad7ab58e321a09652ead3c
SHA131dbb862cc5066aacd307a490ee1825b149748d8
SHA256f5f5035c488b2ff92930c3991d006aee5f8f80bbea28c58b2533223b70593237
SHA512e46c145ae00da2d898c8317c2a1e8621d13d08281af745faffa126dbf89e86b67761704b93f7c7681ce3c7f01fe314ebff6eb2040b3532711ef01221ce94b8b5
-
Filesize
1KB
MD582a7b8ef3bc275711e3b27c6df93c7ff
SHA1bdac909f26475c94c74145576bcf22adb0f8203c
SHA256582921e5e6617cb736006c46c9c8576d8fdefb8763469bdbf305d52d298f6124
SHA512f2100bca60280f6ad93f40254d6fe69bd9917a44973516874aa54c28042796503daac5c51869924f5ecd17615f461dda6441f479e1201c44ad07f5a7728af248