Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 22:38
Behavioral task
behavioral1
Sample
5866c235b29b96ff82f8619e07f1fa8320b513debd57e53a7dff48c78f8d0ce9.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5866c235b29b96ff82f8619e07f1fa8320b513debd57e53a7dff48c78f8d0ce9.exe
Resource
win10v2004-20241007-en
General
-
Target
5866c235b29b96ff82f8619e07f1fa8320b513debd57e53a7dff48c78f8d0ce9.exe
-
Size
2.7MB
-
MD5
87121f0b67560db75d929c84725643b3
-
SHA1
03e91ee1a736453bf3e766356699bb28c6d77eab
-
SHA256
5866c235b29b96ff82f8619e07f1fa8320b513debd57e53a7dff48c78f8d0ce9
-
SHA512
d363feadc1f6495da81d9ab12f7ed96daef32be75eed14e99ddcf4e9cc6342b8fec70e7c18462e2faf3d3b37e04087521614eca6be13a14f461be4fb1cd8fe2b
-
SSDEEP
49152:hbA3gVUa/Y8V8FyK0Uw3bpuyd9Vt4o1NzOmxbZEysqmVYA7:hbqhK850Uw9uy12oHOmjsz+c
Malware Config
Signatures
-
DcRat 61 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process File created C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\ea1d8f6d871115 bridgeportNet.exe 1712 schtasks.exe 2836 schtasks.exe 3380 schtasks.exe 4620 schtasks.exe 1648 schtasks.exe 2100 schtasks.exe 3972 schtasks.exe 3020 schtasks.exe 4812 schtasks.exe 3568 schtasks.exe 4592 schtasks.exe 668 schtasks.exe 4832 schtasks.exe 3140 schtasks.exe 4808 schtasks.exe 2128 schtasks.exe 2232 schtasks.exe 2068 schtasks.exe 3192 schtasks.exe 4076 schtasks.exe 4976 schtasks.exe 3136 schtasks.exe 2304 schtasks.exe File created C:\Windows\LiveKernelReports\7dc9a666359f98 bridgeportNet.exe 1924 schtasks.exe 3376 schtasks.exe 3916 schtasks.exe 1568 schtasks.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\22eafd247d37c3 bridgeportNet.exe 1536 schtasks.exe 4288 schtasks.exe 4400 schtasks.exe 2920 schtasks.exe 1724 schtasks.exe 4884 schtasks.exe 5024 schtasks.exe 3752 schtasks.exe 4952 schtasks.exe 116 schtasks.exe 3956 schtasks.exe 1032 schtasks.exe 2368 schtasks.exe 4092 schtasks.exe 4780 schtasks.exe 1132 schtasks.exe 2592 schtasks.exe 3932 schtasks.exe 2240 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5866c235b29b96ff82f8619e07f1fa8320b513debd57e53a7dff48c78f8d0ce9.exe 548 schtasks.exe 4220 schtasks.exe 1332 schtasks.exe 860 schtasks.exe 4160 schtasks.exe 1688 schtasks.exe 1084 schtasks.exe 1868 schtasks.exe 3516 schtasks.exe 5036 schtasks.exe 1148 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 57 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1648 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 548 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1536 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3932 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3972 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4220 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2232 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4808 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1568 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4592 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2368 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 668 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4620 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5024 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2304 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4780 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2100 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4832 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3752 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1084 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4952 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1868 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1332 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3376 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4812 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4076 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3516 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1132 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4288 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4884 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 116 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4092 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4976 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 860 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3136 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3140 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4160 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3956 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1032 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3568 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5036 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3192 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3380 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3916 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4400 2864 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 2864 schtasks.exe 86 -
resource yara_rule behavioral2/files/0x000a000000023b94-10.dat dcrat behavioral2/memory/1964-13-0x0000000000A80000-0x0000000000CBC000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 5866c235b29b96ff82f8619e07f1fa8320b513debd57e53a7dff48c78f8d0ce9.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation bridgeportNet.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation bridgeportNet.exe -
Executes dropped EXE 3 IoCs
pid Process 1964 bridgeportNet.exe 432 bridgeportNet.exe 4200 wininit.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\fr-FR\sihost.exe bridgeportNet.exe File created C:\Program Files (x86)\Windows Mail\wininit.exe bridgeportNet.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\66fc9ff0ee96c2 bridgeportNet.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\upfc.exe bridgeportNet.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\Registration\sppsvc.exe bridgeportNet.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\Registration\0a1fd5f707cd16 bridgeportNet.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\7dc9a666359f98 bridgeportNet.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\TextInputHost.exe bridgeportNet.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\22eafd247d37c3 bridgeportNet.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\bridgeportNet.exe bridgeportNet.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\ea1d8f6d871115 bridgeportNet.exe File created C:\Program Files\Windows Media Player\fr-FR\66fc9ff0ee96c2 bridgeportNet.exe File created C:\Program Files (x86)\Windows Mail\56085415360792 bridgeportNet.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\sihost.exe bridgeportNet.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\LiveKernelReports\bridgeportNet.exe bridgeportNet.exe File created C:\Windows\LiveKernelReports\7dc9a666359f98 bridgeportNet.exe File created C:\Windows\Help\Windows\IndexStore\fontdrvhost.exe bridgeportNet.exe File created C:\Windows\Help\Windows\IndexStore\5b884080fd4f94 bridgeportNet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5866c235b29b96ff82f8619e07f1fa8320b513debd57e53a7dff48c78f8d0ce9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 5866c235b29b96ff82f8619e07f1fa8320b513debd57e53a7dff48c78f8d0ce9.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings bridgeportNet.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 57 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3140 schtasks.exe 2836 schtasks.exe 1868 schtasks.exe 4160 schtasks.exe 4400 schtasks.exe 1148 schtasks.exe 1712 schtasks.exe 2068 schtasks.exe 4952 schtasks.exe 2128 schtasks.exe 3568 schtasks.exe 3136 schtasks.exe 5036 schtasks.exe 3916 schtasks.exe 2368 schtasks.exe 1332 schtasks.exe 4092 schtasks.exe 2920 schtasks.exe 1084 schtasks.exe 116 schtasks.exe 3380 schtasks.exe 3972 schtasks.exe 4620 schtasks.exe 2100 schtasks.exe 3956 schtasks.exe 668 schtasks.exe 3752 schtasks.exe 3376 schtasks.exe 1688 schtasks.exe 2592 schtasks.exe 1132 schtasks.exe 4220 schtasks.exe 4780 schtasks.exe 4832 schtasks.exe 1924 schtasks.exe 2240 schtasks.exe 4076 schtasks.exe 4884 schtasks.exe 3932 schtasks.exe 1568 schtasks.exe 5024 schtasks.exe 4812 schtasks.exe 4976 schtasks.exe 860 schtasks.exe 1648 schtasks.exe 2232 schtasks.exe 2304 schtasks.exe 1724 schtasks.exe 548 schtasks.exe 3020 schtasks.exe 4592 schtasks.exe 4288 schtasks.exe 1032 schtasks.exe 3192 schtasks.exe 1536 schtasks.exe 4808 schtasks.exe 3516 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1964 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 432 bridgeportNet.exe 4200 wininit.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1964 bridgeportNet.exe Token: SeDebugPrivilege 432 bridgeportNet.exe Token: SeDebugPrivilege 4200 wininit.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 928 wrote to memory of 516 928 5866c235b29b96ff82f8619e07f1fa8320b513debd57e53a7dff48c78f8d0ce9.exe 82 PID 928 wrote to memory of 516 928 5866c235b29b96ff82f8619e07f1fa8320b513debd57e53a7dff48c78f8d0ce9.exe 82 PID 928 wrote to memory of 516 928 5866c235b29b96ff82f8619e07f1fa8320b513debd57e53a7dff48c78f8d0ce9.exe 82 PID 516 wrote to memory of 3240 516 WScript.exe 83 PID 516 wrote to memory of 3240 516 WScript.exe 83 PID 516 wrote to memory of 3240 516 WScript.exe 83 PID 3240 wrote to memory of 1964 3240 cmd.exe 85 PID 3240 wrote to memory of 1964 3240 cmd.exe 85 PID 1964 wrote to memory of 432 1964 bridgeportNet.exe 108 PID 1964 wrote to memory of 432 1964 bridgeportNet.exe 108 PID 432 wrote to memory of 2188 432 bridgeportNet.exe 145 PID 432 wrote to memory of 2188 432 bridgeportNet.exe 145 PID 2188 wrote to memory of 3368 2188 cmd.exe 147 PID 2188 wrote to memory of 3368 2188 cmd.exe 147 PID 2188 wrote to memory of 4200 2188 cmd.exe 153 PID 2188 wrote to memory of 4200 2188 cmd.exe 153 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5866c235b29b96ff82f8619e07f1fa8320b513debd57e53a7dff48c78f8d0ce9.exe"C:\Users\Admin\AppData\Local\Temp\5866c235b29b96ff82f8619e07f1fa8320b513debd57e53a7dff48c78f8d0ce9.exe"1⤵
- DcRat
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\BlockContainerComponentsessionSvc\o6uXJEqS9rLqp3Odtcyc3i9io.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\BlockContainerComponentsessionSvc\VnZYMX.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\BlockContainerComponentsessionSvc\bridgeportNet.exe"C:\BlockContainerComponentsessionSvc\bridgeportNet.exe"4⤵
- DcRat
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\BlockContainerComponentsessionSvc\bridgeportNet.exe"C:\BlockContainerComponentsessionSvc\bridgeportNet.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\f2UR7rll1R.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:3368
-
-
C:\Program Files (x86)\Windows Mail\wininit.exe"C:\Program Files (x86)\Windows Mail\wininit.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 11 /tr "'C:\BlockContainerComponentsessionSvc\unsecapp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\BlockContainerComponentsessionSvc\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 6 /tr "'C:\BlockContainerComponentsessionSvc\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\upfc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Recent\taskhostw.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Default\Recent\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Recent\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bridgeportNetb" /sc MINUTE /mo 12 /tr "'C:\Windows\LiveKernelReports\bridgeportNet.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bridgeportNet" /sc ONLOGON /tr "'C:\Windows\LiveKernelReports\bridgeportNet.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bridgeportNetb" /sc MINUTE /mo 11 /tr "'C:\Windows\LiveKernelReports\bridgeportNet.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\BlockContainerComponentsessionSvc\OfficeClickToRun.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\BlockContainerComponentsessionSvc\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\BlockContainerComponentsessionSvc\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\TextInputHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Default User\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Windows\Help\Windows\IndexStore\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Help\Windows\IndexStore\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Windows\Help\Windows\IndexStore\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Registration\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Registration\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Registration\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bridgeportNetb" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Common Files\Adobe\Reader\DC\bridgeportNet.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bridgeportNet" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Adobe\Reader\DC\bridgeportNet.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bridgeportNetb" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Common Files\Adobe\Reader\DC\bridgeportNet.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Media Player\fr-FR\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\fr-FR\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Media Player\fr-FR\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\BlockContainerComponentsessionSvc\SearchApp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\BlockContainerComponentsessionSvc\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 8 /tr "'C:\BlockContainerComponentsessionSvc\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\BlockContainerComponentsessionSvc\OfficeClickToRun.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\BlockContainerComponentsessionSvc\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 12 /tr "'C:\BlockContainerComponentsessionSvc\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Mail\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Mail\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Package Cache\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\All Users\Package Cache\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Package Cache\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Application Data\upfc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\Admin\Application Data\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Application Data\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Desktop\Registry.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\Public\Desktop\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Desktop\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56B
MD57b80b4259dec89889d5c4040630d53b3
SHA18002de463587f7045e0ed9d2e471e828c4f8f209
SHA256f3ced3fc59aea3c5629a0b1d0a6836d40dbf79ec442c7bd9226c6e2d110d8b93
SHA512ffa575a6844664e3263cbef183775bd633c94534caf2c3603395d64c442fbf4e6b307ffb188cd0fd567107f6e3a143ebd5a38d1c57c530d8c8c818dac6a39a37
-
Filesize
2.2MB
MD54dfc74f477b78593b015f7597229e298
SHA104d9c06e41ec97e4c5de76204437b3518f523bb5
SHA2566139e3df341fd45406c1b2755400cf99a63c0dc2dbaa500f2130cc6ae144f03c
SHA512decebdb46975a655b414044940cfeaf4bb83e5b7d0b998bb3320de13da7d37ecc02f4382384675f0da9a7ea965f4224ad39c39cf78d0cf5a82630e8163a4b811
-
Filesize
742B
MD590ea78dcc4aa067caced96785d8494a2
SHA16795c73fdb553e1788113b4b179f6df4b752732e
SHA256995c834a8c04beaa7fe14ab233d79f681af5bdfb873cb8dbbf84a7034324ccbd
SHA51214194be6e05074ef95b013cf9f268313ca6f899af8282ce284e79c0e8795a6ae7dbf8612cd214006fd097c211c0e483afee423794827f99b62944eb4ff598d84
-
Filesize
216B
MD53a3f3fa18d84901615e0f2a363ae2a56
SHA13318835f386aa7e4cd8839be17c470a5d8c85ade
SHA256211561aca27398d1e88ccbf2e1678d46f59cc2e4dc9e9873770d95ac3c236448
SHA512d63b41992c87a3de14ed31f392f49406ca3b332ceab4d6ca9cb476c52c8249554ccf178c3acc31c601cc1c71d5758f083299766a38037e4fac30859f0315e5d7
-
Filesize
1KB
MD5bbb951a34b516b66451218a3ec3b0ae1
SHA17393835a2476ae655916e0a9687eeaba3ee876e9
SHA256eb70c64ae99d14ac2588b7a84854fbf3c420532d7fe4dfd49c7b5a70c869943a
SHA51263bcbfcf8e7421c66855c487c31b2991a989bdea0c1edd4c40066b52fa3eb3d9d37db1cd21b8eb4f33dd5870cc20532c8f485eab9c0b4f6b0793a35c077f2d6f
-
Filesize
212B
MD5133b16d94ed074f70ca1fbe1f380d82a
SHA14433c42896d3ef341190b6f3e7a3e96f7efe089e
SHA256df393e8d4411f7cc2941978d23c9b3fd3fa8abeeb8cde1a1912eb003cc23e573
SHA5127a2cba0795a9f93f3cc7e45c17cc3488186ffdc93d770ebfe7a08fbea77141ba6b259f5ff3b3d0b0ba6c223f56d85c2b7c03062d11263ed492c1040c7f47f40a