Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 01:55
Behavioral task
behavioral1
Sample
2abf0a43060822d9de4bbdf47ce86f18.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2abf0a43060822d9de4bbdf47ce86f18.exe
Resource
win10v2004-20241007-en
General
-
Target
2abf0a43060822d9de4bbdf47ce86f18.exe
-
Size
1.3MB
-
MD5
2abf0a43060822d9de4bbdf47ce86f18
-
SHA1
6cf607aad69b621bc6588554a829f43356dd1982
-
SHA256
319781e3769beba7c2ea7960fd3bb69085bf49212e6f94195b90e9d61aa777c2
-
SHA512
ed680a510607e89207960dff940e9e1b094c8d2dacdc71a9d530f5c2dc13ea01e6b197c2b3c563a181f29e61ac480694367364161d2607daa3b39bad8154c59c
-
SSDEEP
24576:6eQUdeXNZK2iMWaKJLOXXSI1hJXET8ynWbnOuO9MWHjVUcmo:6e2S1JCp1zoxWyuO9HDu
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1104 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5036 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4900 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4560 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 832 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2388 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 924 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4976 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4700 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3424 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4832 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1868 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2864 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4348 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4540 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1848 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3628 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1028 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5012 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4336 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3160 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1020 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2188 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2408 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4592 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 60 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1372 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4444 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4272 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2052 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4584 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4024 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 228 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4412 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1680 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4448 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2080 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1468 4464 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 4464 schtasks.exe 83 -
resource yara_rule behavioral2/memory/1376-1-0x0000000000D70000-0x0000000000EC0000-memory.dmp dcrat behavioral2/files/0x000a000000023b8e-17.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 2abf0a43060822d9de4bbdf47ce86f18.exe -
Executes dropped EXE 1 IoCs
pid Process 2484 services.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\es-ES\csrss.exe 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files\Crashpad\ee2ad38f3d4382 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files\Windows Media Player\es-ES\886983d96e3d3e 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files (x86)\Google\MusNotification.exe 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files\Crashpad\Registry.exe 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files\Windows Multimedia Platform\SearchApp.exe 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files\Windows Multimedia Platform\38384e6a620884 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files\Windows Security\ea1d8f6d871115 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files\Crashpad\attachments\45694d4fc0033c 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files\Windows Security\upfc.exe 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files\ModifiableWindowsApps\dllhost.exe 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files (x86)\Windows Defender\it-IT\explorer.exe 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files (x86)\Windows Defender\it-IT\7a0fd90576e088 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files (x86)\Google\aa97147c4c782d 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Program Files\Crashpad\attachments\2abf0a43060822d9de4bbdf47ce86f18.exe 2abf0a43060822d9de4bbdf47ce86f18.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\ServiceState\WinHttpAutoProxySvc\2abf0a43060822d9de4bbdf47ce86f18.exe 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Windows\Cursors\Registry.exe 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Windows\Cursors\ee2ad38f3d4382 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Windows\WaaS\SearchApp.exe 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Windows\schemas\services.exe 2abf0a43060822d9de4bbdf47ce86f18.exe File created C:\Windows\schemas\c5b4cb5e9653cc 2abf0a43060822d9de4bbdf47ce86f18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 2abf0a43060822d9de4bbdf47ce86f18.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5036 schtasks.exe 2864 schtasks.exe 2832 schtasks.exe 1468 schtasks.exe 2408 schtasks.exe 4448 schtasks.exe 2080 schtasks.exe 4560 schtasks.exe 2388 schtasks.exe 3004 schtasks.exe 2024 schtasks.exe 4272 schtasks.exe 4584 schtasks.exe 1680 schtasks.exe 4832 schtasks.exe 1868 schtasks.exe 4336 schtasks.exe 1020 schtasks.exe 2512 schtasks.exe 60 schtasks.exe 1104 schtasks.exe 4976 schtasks.exe 4348 schtasks.exe 3628 schtasks.exe 2188 schtasks.exe 1372 schtasks.exe 2000 schtasks.exe 4024 schtasks.exe 1732 schtasks.exe 832 schtasks.exe 924 schtasks.exe 4700 schtasks.exe 3424 schtasks.exe 1848 schtasks.exe 4592 schtasks.exe 2052 schtasks.exe 228 schtasks.exe 4540 schtasks.exe 1028 schtasks.exe 4412 schtasks.exe 2056 schtasks.exe 4900 schtasks.exe 5012 schtasks.exe 3160 schtasks.exe 4444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 2484 services.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1376 2abf0a43060822d9de4bbdf47ce86f18.exe Token: SeDebugPrivilege 2484 services.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1376 wrote to memory of 2204 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 129 PID 1376 wrote to memory of 2204 1376 2abf0a43060822d9de4bbdf47ce86f18.exe 129 PID 2204 wrote to memory of 1452 2204 cmd.exe 131 PID 2204 wrote to memory of 1452 2204 cmd.exe 131 PID 2204 wrote to memory of 2484 2204 cmd.exe 133 PID 2204 wrote to memory of 2484 2204 cmd.exe 133 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2abf0a43060822d9de4bbdf47ce86f18.exe"C:\Users\Admin\AppData\Local\Temp\2abf0a43060822d9de4bbdf47ce86f18.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ehSGFIZvPY.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1452
-
-
C:\Windows\schemas\services.exe"C:\Windows\schemas\services.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Multimedia Platform\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Multimedia Platform\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Security\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\Windows Security\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Security\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Defender\it-IT\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\it-IT\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Defender\it-IT\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Windows\schemas\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\schemas\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Windows\schemas\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Media Player\es-ES\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\es-ES\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Media Player\es-ES\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\All Users\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:60
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Google\MusNotification.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Windows\Cursors\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\Cursors\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Windows\Cursors\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Crashpad\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\Crashpad\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 11 /tr "'C:\Program Files\Crashpad\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2abf0a43060822d9de4bbdf47ce86f182" /sc MINUTE /mo 12 /tr "'C:\Program Files\Crashpad\attachments\2abf0a43060822d9de4bbdf47ce86f18.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2abf0a43060822d9de4bbdf47ce86f18" /sc ONLOGON /tr "'C:\Program Files\Crashpad\attachments\2abf0a43060822d9de4bbdf47ce86f18.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2abf0a43060822d9de4bbdf47ce86f182" /sc MINUTE /mo 6 /tr "'C:\Program Files\Crashpad\attachments\2abf0a43060822d9de4bbdf47ce86f18.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Users\Default\AppData\Local\Application Data\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\AppData\Local\Application Data\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Users\Default\AppData\Local\Application Data\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196B
MD56161de79b8f8f5f62b20e02e8b55280a
SHA1c6203145946f08ae0f500db873d0bbd182300096
SHA2566835be2ed50109b21dfc8e9f4ce62a0deeb9500a8fdfc30191406b55643f7e3e
SHA5125a2b3c5ebce361e11b6a67e6ee22e6329dbb0f95074ea45a71aa9406530df2925a4cbf6f6628d2675222b92668f6823a9e7c1f6a42f23ce6da7d71f0938c22df
-
Filesize
1.3MB
MD52abf0a43060822d9de4bbdf47ce86f18
SHA16cf607aad69b621bc6588554a829f43356dd1982
SHA256319781e3769beba7c2ea7960fd3bb69085bf49212e6f94195b90e9d61aa777c2
SHA512ed680a510607e89207960dff940e9e1b094c8d2dacdc71a9d530f5c2dc13ea01e6b197c2b3c563a181f29e61ac480694367364161d2607daa3b39bad8154c59c