Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 23:28
Behavioral task
behavioral1
Sample
6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe
Resource
win10v2004-20241007-en
General
-
Target
6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe
-
Size
1.7MB
-
MD5
7ea3070589cbe24ec44cbaf50dea5966
-
SHA1
0755183f623545ab3ff86e9c89ee96de7acdcace
-
SHA256
6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c
-
SHA512
f8645dae0f93ed9a864bb94c1b300f41a5b97af7211ff23f17cbdc791a5f3f731478a9780b9c3eaa53189997aa7e4a686068bf46138046ed4f4347b8303bb615
-
SSDEEP
49152:j+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:OTHUxUoh1IF9gl2
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4896 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4848 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3604 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4424 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4584 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3696 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3300 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4428 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 224 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4988 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 232 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 184 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1184 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4624 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2396 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3560 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2040 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1488 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2528 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 64 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3292 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4412 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3484 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2968 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4772 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3008 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3624 2940 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1472 2940 schtasks.exe 82 -
resource yara_rule behavioral2/memory/2516-1-0x00000000002D0000-0x0000000000490000-memory.dmp dcrat behavioral2/files/0x0007000000023caf-30.dat dcrat behavioral2/files/0x0008000000023cca-128.dat dcrat behavioral2/files/0x0009000000023cb7-137.dat dcrat behavioral2/memory/864-312-0x0000000000210000-0x00000000003D0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1844 powershell.exe 760 powershell.exe 1392 powershell.exe 2852 powershell.exe 1524 powershell.exe 3628 powershell.exe 5020 powershell.exe 4828 powershell.exe 5052 powershell.exe 3712 powershell.exe 780 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe -
Executes dropped EXE 3 IoCs
pid Process 864 csrss.exe 556 csrss.exe 2920 csrss.exe -
Drops file in Program Files directory 40 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\RCXAB18.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\Mozilla Firefox\RCXB138.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\RCXB843.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\VideoLAN\RCXBF5D.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\VideoLAN\wininit.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files (x86)\MSBuild\ea9f0e6c9e2dcd 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files\VideoLAN\56085415360792 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\Reference Assemblies\RCXAF33.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files\Uninstall Information\38384e6a620884 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files\Mozilla Firefox\cc11b995f2a76d 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files\Uninstall Information\SearchApp.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files (x86)\Windows Media Player\6203df4a6bafc7 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\Reference Assemblies\RCXAF32.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files (x86)\MSBuild\RCXB3BB.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files\Reference Assemblies\services.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files (x86)\MSBuild\taskhostw.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\Reference Assemblies\services.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\Mozilla Firefox\winlogon.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files\VideoLAN\VLC\csrss.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files\VideoLAN\VLC\886983d96e3d3e 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files\Mozilla Firefox\winlogon.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files\VideoLAN\wininit.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\Mozilla Firefox\RCXB137.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files (x86)\MSBuild\RCXB3BA.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files (x86)\Windows Media Player\RCXC162.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\VideoLAN\VLC\csrss.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\Uninstall Information\RCXB5BF.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files\Reference Assemblies\c5b4cb5e9653cc 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\VideoLAN\VLC\RCXAB17.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files (x86)\MSBuild\taskhostw.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\RCXB7D5.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files (x86)\Windows Media Player\RCXC1E0.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files (x86)\Windows Multimedia Platform\886983d96e3d3e 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\Uninstall Information\RCXB5C0.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\Uninstall Information\SearchApp.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files\VideoLAN\RCXBF5E.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Program Files (x86)\Windows Media Player\lsass.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Program Files (x86)\Windows Media Player\lsass.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\IME\OfficeClickToRun.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File created C:\Windows\IME\e6c9b481da804f 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Windows\IME\RCXBA67.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Windows\IME\RCXBAD5.tmp 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe File opened for modification C:\Windows\IME\OfficeClickToRun.exe 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3300 schtasks.exe 1184 schtasks.exe 3560 schtasks.exe 2040 schtasks.exe 4584 schtasks.exe 1992 schtasks.exe 3696 schtasks.exe 2628 schtasks.exe 3008 schtasks.exe 1472 schtasks.exe 3604 schtasks.exe 2396 schtasks.exe 2528 schtasks.exe 3292 schtasks.exe 3624 schtasks.exe 64 schtasks.exe 4896 schtasks.exe 4848 schtasks.exe 224 schtasks.exe 2084 schtasks.exe 1692 schtasks.exe 184 schtasks.exe 2968 schtasks.exe 4424 schtasks.exe 4428 schtasks.exe 4988 schtasks.exe 232 schtasks.exe 4624 schtasks.exe 2184 schtasks.exe 1488 schtasks.exe 4412 schtasks.exe 3484 schtasks.exe 4772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 3628 powershell.exe 3628 powershell.exe 5052 powershell.exe 5052 powershell.exe 3712 powershell.exe 3712 powershell.exe 4828 powershell.exe 4828 powershell.exe 5020 powershell.exe 5020 powershell.exe 2852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe Token: SeDebugPrivilege 3628 powershell.exe Token: SeDebugPrivilege 5052 powershell.exe Token: SeDebugPrivilege 3712 powershell.exe Token: SeDebugPrivilege 4828 powershell.exe Token: SeDebugPrivilege 5020 powershell.exe Token: SeDebugPrivilege 2852 powershell.exe Token: SeDebugPrivilege 1392 powershell.exe Token: SeDebugPrivilege 760 powershell.exe Token: SeDebugPrivilege 1844 powershell.exe Token: SeDebugPrivilege 780 powershell.exe Token: SeDebugPrivilege 1524 powershell.exe Token: SeDebugPrivilege 864 csrss.exe Token: SeDebugPrivilege 556 csrss.exe Token: SeDebugPrivilege 2920 csrss.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2516 wrote to memory of 3628 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 119 PID 2516 wrote to memory of 3628 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 119 PID 2516 wrote to memory of 780 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 120 PID 2516 wrote to memory of 780 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 120 PID 2516 wrote to memory of 1524 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 121 PID 2516 wrote to memory of 1524 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 121 PID 2516 wrote to memory of 2852 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 122 PID 2516 wrote to memory of 2852 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 122 PID 2516 wrote to memory of 3712 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 123 PID 2516 wrote to memory of 3712 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 123 PID 2516 wrote to memory of 5052 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 124 PID 2516 wrote to memory of 5052 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 124 PID 2516 wrote to memory of 4828 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 125 PID 2516 wrote to memory of 4828 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 125 PID 2516 wrote to memory of 1392 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 126 PID 2516 wrote to memory of 1392 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 126 PID 2516 wrote to memory of 760 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 127 PID 2516 wrote to memory of 760 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 127 PID 2516 wrote to memory of 5020 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 128 PID 2516 wrote to memory of 5020 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 128 PID 2516 wrote to memory of 1844 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 129 PID 2516 wrote to memory of 1844 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 129 PID 2516 wrote to memory of 3724 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 141 PID 2516 wrote to memory of 3724 2516 6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe 141 PID 3724 wrote to memory of 2880 3724 cmd.exe 143 PID 3724 wrote to memory of 2880 3724 cmd.exe 143 PID 3724 wrote to memory of 864 3724 cmd.exe 147 PID 3724 wrote to memory of 864 3724 cmd.exe 147 PID 864 wrote to memory of 1608 864 csrss.exe 148 PID 864 wrote to memory of 1608 864 csrss.exe 148 PID 864 wrote to memory of 1304 864 csrss.exe 149 PID 864 wrote to memory of 1304 864 csrss.exe 149 PID 1608 wrote to memory of 556 1608 WScript.exe 152 PID 1608 wrote to memory of 556 1608 WScript.exe 152 PID 556 wrote to memory of 2404 556 csrss.exe 153 PID 556 wrote to memory of 2404 556 csrss.exe 153 PID 556 wrote to memory of 3464 556 csrss.exe 154 PID 556 wrote to memory of 3464 556 csrss.exe 154 PID 2404 wrote to memory of 2920 2404 WScript.exe 155 PID 2404 wrote to memory of 2920 2404 WScript.exe 155 PID 2920 wrote to memory of 3744 2920 csrss.exe 156 PID 2920 wrote to memory of 3744 2920 csrss.exe 156 PID 2920 wrote to memory of 3308 2920 csrss.exe 157 PID 2920 wrote to memory of 3308 2920 csrss.exe 157 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe"C:\Users\Admin\AppData\Local\Temp\6eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1H6ynXXYCL.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2880
-
-
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\855b0bd2-cbdf-4a2a-803b-1f48100d08e4.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c6a40558-32cd-4546-9eca-662cea7f77a1.vbs"6⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\20fd681b-2a6d-4d54-8961-01ac26f13927.vbs"8⤵PID:3744
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\838dd3c1-f41a-4188-bcfb-9c6ac4b60aff.vbs"8⤵PID:3308
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\af5d656b-19d7-4684-a183-82ebbbaf2cb4.vbs"6⤵PID:3464
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1bbed78d-9398-4810-a842-f5863d0015ea.vbs"4⤵PID:1304
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Program Files\VideoLAN\VLC\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Program Files\VideoLAN\VLC\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Documents\My Videos\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Public\Documents\My Videos\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Documents\My Videos\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files\Reference Assemblies\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Program Files\Reference Assemblies\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Program Files\Mozilla Firefox\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Program Files\Mozilla Firefox\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\MSBuild\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\MSBuild\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Uninstall Information\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Uninstall Information\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Windows\IME\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\IME\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\Windows\IME\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:64
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files\VideoLAN\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Program Files\VideoLAN\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Media Player\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Media Player\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD57ea3070589cbe24ec44cbaf50dea5966
SHA10755183f623545ab3ff86e9c89ee96de7acdcace
SHA2566eab9cdead3e8e10165ac61055e8d6cb1f874f0545ec501f96331fb8ebc7770c
SHA512f8645dae0f93ed9a864bb94c1b300f41a5b97af7211ff23f17cbdc791a5f3f731478a9780b9c3eaa53189997aa7e4a686068bf46138046ed4f4347b8303bb615
-
Filesize
1.7MB
MD5530c595621e2d21751779e4ba002e69a
SHA15e388fda5b20d660bb3a97e49ba99fc9d1fb0a87
SHA2560aa383fee0e7bd7e4593b0d0bf77c93aba4de6d9cc562023356cb0b3e798ef83
SHA512a0fec3a60f962a6b21446ccca94723a57e658a0050d8a274fc7e19901591b2ca30c9ad9873198dc6b647b9a8e879961ebb76b6e79372d5f6571d3bd67e569dec
-
Filesize
1KB
MD54a667f150a4d1d02f53a9f24d89d53d1
SHA1306e125c9edce66f28fdb63e6c4ca5c9ad6e8c97
SHA256414659decfd237dde09625a49811e03b5b30ee06ee2ee97ea8bcfac394d281fd
SHA5124edd8e73ce03488a6d92750a782cd4042fbb54a5b3f8d8ba3ea227fda0653c2cd84f0c5d64976c7cdc1f518a2fdc8ff10e2a015ec7acf3cd01b0d62bc98542d8
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD56c47b3f4e68eebd47e9332eebfd2dd4e
SHA167f0b143336d7db7b281ed3de5e877fa87261834
SHA2568c48b1f2338e5b24094821f41121d2221f1cb3200338f46df49f64d1c4bc3e0c
SHA5120acf302a9fc971ef9df65ed42c47ea17828e54dff685f4434f360556fd27cdc26a75069f00dcdc14ba174893c6fd7a2cfd8c6c07be3ce35dafee0a006914eaca
-
Filesize
225B
MD5d90155315dbf9fb884d197e2146982ec
SHA1b0b6c57ddbb7e6848a0342eb2a0b5e47062be6b3
SHA2563f63f684c679c4c449de7880e840d094518ce0efa4c8fa7a6b1a1651017c677b
SHA51256334d6ecc0b90a071bf9760adcd61b1300129d627ef8e01133f61d634de3f363ae2d1340de02cdc575ece186459467666332ebf929cd9da15f4d50e6d979b36
-
Filesize
512B
MD53ab9655d8a1cdba9f2b8c1a6e6582846
SHA12d7db42efe6c3462c646e4d5e0ee559bfe4522ea
SHA25668910d70d280e63450230ea998f08e04b630dc697a8d6a6733a1cf7e6af9cfe2
SHA512e6c6c19ae0c45d8ca70f93f91afd8c342db42988215106aa388fa44f7455ad4e2f858de1016cfc3645ca1bb59b11fd0c55d87fa609be87e673d5d5d0d78efe3e
-
Filesize
736B
MD5b9715328b03a933022c53422ffab4edd
SHA1a36d8e48ce43c05dd0ded15779db7718894f4347
SHA256ac1b6decc8b3f55656135e808dd51f8014d22d022e0ca1427da5a1e254fec245
SHA512705ff0d1e8d723259ae626e3348175fe42f299048c82116592c874521dbb4b9edf6bc03d64ebe4e5751659451edf98b7ef9589884c152ddf2aef0456d786565c
-
Filesize
735B
MD5bc75b7852ea54854f481e0373d719345
SHA1d06bbbc9ff493a27489935b47d6913c2196cff6d
SHA2564cd110aa76a147dbf58e627fd649f494b5ac59ac79f6b420a2bc4005937b366f
SHA51285fd15f4d4434f63e3c894572c865202e3bb9b31e1f5353c447922b5444917b8936074e908154708a5cb0ae0a8b785dfce5251ac5334d5f1f370184fe3df51b7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
735B
MD54c601b5e3fab826f4c2814fd5fccd4e7
SHA172c902566f4a402f60abd7811ae59d15b08d5078
SHA2567cebb449a045b72c14425c1f493b2326d36262c3c87abf9411081e3797ccf99a
SHA5124cedea48df6f10791125c5b7c5aecdb58614fe7ddb8896473c46b85b5f677ae2c9879316917da78bbed047c5a564632f4edd4a76eebdfa5a77dd6ea1fb10e46d
-
Filesize
1.7MB
MD57f644be4bbce2ab827f5fcc0d9101faf
SHA1e4ef95dc3e08dd6579c93fd794df77a1077646e5
SHA25644cec9c86760880daed3397ea86f55133198b1a1d945be763189e13a5eab429d
SHA512c59f4b504384a7ce9505b67c84d72accf15ce510f4ac17365d6da2fb688f57f9734a380a3760133662aab0626dbf70d252ae1adf78a976a005869ff89b135821