Analysis
-
max time kernel
119s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 03:40
Behavioral task
behavioral1
Sample
f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe
Resource
win10v2004-20241007-en
General
-
Target
f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe
-
Size
2.2MB
-
MD5
29329d17b110755ec3a04e157abb845c
-
SHA1
756fd244223a93ce2778fd7fb5558d9861328d01
-
SHA256
f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393
-
SHA512
89c29661d31fad68c9eb6a96a105c32c0c5e620cafc7e028031dd6b5ea4a0693e5d200ec8afab2989a169f6530764ad1427d431e8d0864bb0dec63e302b8f06f
-
SSDEEP
24576:z2G/nvxW3WieCaKuZ3X4NGX254GP/gG22G/nvxW3WieCaKuZ3X4NGX254GP/gG3:zbA3jdKGMbA3jdKG5
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1008 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1568 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 952 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 796 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 568 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1488 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1968 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 764 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1764 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2852 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 912 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 408 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 748 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1720 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1752 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1748 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 940 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1560 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1820 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1896 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2196 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1564 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 992 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1324 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2504 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 836 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1608 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1612 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 1164 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2880 1164 schtasks.exe 37 -
resource yara_rule behavioral1/files/0x000a000000012281-2.dat dcrat behavioral1/files/0x000700000001868b-8.dat dcrat behavioral1/memory/868-16-0x0000000000400000-0x0000000000644000-memory.dmp dcrat behavioral1/memory/2104-21-0x0000000000400000-0x0000000000526000-memory.dmp dcrat behavioral1/files/0x0006000000018731-27.dat dcrat behavioral1/memory/2768-31-0x0000000000120000-0x00000000001F6000-memory.dmp dcrat behavioral1/memory/348-70-0x0000000000060000-0x0000000000136000-memory.dmp dcrat -
Executes dropped EXE 4 IoCs
pid Process 3000 Windows Security center.exe 2104 Xeno.exe 2768 bridgeserver.exe 348 System.exe -
Loads dropped DLL 5 IoCs
pid Process 868 f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe 868 f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe 868 f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe 2772 cmd.exe 2772 cmd.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Google\bridgeserver.exe bridgeserver.exe File created C:\Program Files (x86)\Google\9d8a521997bc24 bridgeserver.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\dllhost.exe bridgeserver.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\5940a34987c991 bridgeserver.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\explorer.exe bridgeserver.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\7a0fd90576e088 bridgeserver.exe File created C:\Program Files\Windows Mail\System.exe bridgeserver.exe File created C:\Program Files\Windows Mail\27d1bcfc3c54e0 bridgeserver.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\LiveKernelReports\sppsvc.exe bridgeserver.exe File opened for modification C:\Windows\LiveKernelReports\sppsvc.exe bridgeserver.exe File created C:\Windows\LiveKernelReports\0a1fd5f707cd16 bridgeserver.exe File created C:\Windows\Speech\Common\es-ES\taskhost.exe bridgeserver.exe File created C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\lsm.exe bridgeserver.exe File created C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\101b941d020240 bridgeserver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Security center.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2604 schtasks.exe 2852 schtasks.exe 908 schtasks.exe 1820 schtasks.exe 1608 schtasks.exe 1780 schtasks.exe 796 schtasks.exe 2196 schtasks.exe 992 schtasks.exe 1324 schtasks.exe 2612 schtasks.exe 1488 schtasks.exe 748 schtasks.exe 1380 schtasks.exe 1896 schtasks.exe 1200 schtasks.exe 2504 schtasks.exe 836 schtasks.exe 2596 schtasks.exe 2436 schtasks.exe 2560 schtasks.exe 2988 schtasks.exe 1732 schtasks.exe 2128 schtasks.exe 1564 schtasks.exe 2020 schtasks.exe 2432 schtasks.exe 912 schtasks.exe 408 schtasks.exe 1720 schtasks.exe 1752 schtasks.exe 1568 schtasks.exe 1968 schtasks.exe 940 schtasks.exe 1560 schtasks.exe 1008 schtasks.exe 1148 schtasks.exe 952 schtasks.exe 568 schtasks.exe 1988 schtasks.exe 764 schtasks.exe 1764 schtasks.exe 1748 schtasks.exe 2228 schtasks.exe 2044 schtasks.exe 1508 schtasks.exe 1612 schtasks.exe 2880 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2768 bridgeserver.exe 348 System.exe 348 System.exe 348 System.exe 348 System.exe 348 System.exe 348 System.exe 348 System.exe 348 System.exe 348 System.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2768 bridgeserver.exe Token: SeDebugPrivilege 348 System.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 868 wrote to memory of 3000 868 f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe 31 PID 868 wrote to memory of 3000 868 f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe 31 PID 868 wrote to memory of 3000 868 f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe 31 PID 868 wrote to memory of 3000 868 f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe 31 PID 868 wrote to memory of 2104 868 f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe 32 PID 868 wrote to memory of 2104 868 f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe 32 PID 868 wrote to memory of 2104 868 f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe 32 PID 868 wrote to memory of 2104 868 f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe 32 PID 3000 wrote to memory of 2688 3000 Windows Security center.exe 33 PID 3000 wrote to memory of 2688 3000 Windows Security center.exe 33 PID 3000 wrote to memory of 2688 3000 Windows Security center.exe 33 PID 3000 wrote to memory of 2688 3000 Windows Security center.exe 33 PID 2688 wrote to memory of 2772 2688 WScript.exe 34 PID 2688 wrote to memory of 2772 2688 WScript.exe 34 PID 2688 wrote to memory of 2772 2688 WScript.exe 34 PID 2688 wrote to memory of 2772 2688 WScript.exe 34 PID 2772 wrote to memory of 2768 2772 cmd.exe 36 PID 2772 wrote to memory of 2768 2772 cmd.exe 36 PID 2772 wrote to memory of 2768 2772 cmd.exe 36 PID 2772 wrote to memory of 2768 2772 cmd.exe 36 PID 2768 wrote to memory of 348 2768 bridgeserver.exe 86 PID 2768 wrote to memory of 348 2768 bridgeserver.exe 86 PID 2768 wrote to memory of 348 2768 bridgeserver.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe"C:\Users\Admin\AppData\Local\Temp\f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\Windows Security center.exe"C:\Users\Admin\AppData\Local\Temp\Windows Security center.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\fontReviewWinsvc\IKs0TV0Kka.vbe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\fontReviewWinsvc\vYHJQoDOMXGczhSKhP5y.bat" "4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\fontReviewWinsvc\bridgeserver.exe"C:\fontReviewWinsvc\bridgeserver.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files\Windows Mail\System.exe"C:\Program Files\Windows Mail\System.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno.exe"2⤵
- Executes dropped EXE
PID:2104
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Windows\LiveKernelReports\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\LiveKernelReports\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Windows\LiveKernelReports\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Saved Games\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\Saved Games\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Saved Games\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Mail\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Mail\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bridgeserverb" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Google\bridgeserver.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bridgeserver" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\bridgeserver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bridgeserverb" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Google\bridgeserver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\All Users\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\Admin\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\fontReviewWinsvc\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\fontReviewWinsvc\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\fontReviewWinsvc\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bridgeserverb" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\bridgeserver.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bridgeserver" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\bridgeserver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bridgeserverb" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\bridgeserver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\fontReviewWinsvc\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\fontReviewWinsvc\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\fontReviewWinsvc\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Program Files\Java\jdk1.7.0_80\db\bin\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Java\jdk1.7.0_80\db\bin\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Program Files\Java\jdk1.7.0_80\db\bin\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213B
MD5d563827eec34121a5a03d593e4a4c44f
SHA1abc3a788e4de8d7ab4169876b5b1ed5f60210ef6
SHA256fe9abbd988a3bfe8fceaabd4555fa06e5c55a37e187bd4ed8de220a5ac7acf36
SHA512ab1f3492f9dddc3c9340da5d0e923f14a507cce2ae42102db5ee72193ae5498f39c7ab109c636c8aaeed68d75ca67d34e3456059ab61a4ed8e860c840e7ad180
-
Filesize
38B
MD54f0b93e875d3a9ebf7c3ade562025caa
SHA132d34d4bc3cbf922eb79959b7fb4356ed8208474
SHA256c85e959b1dd2483c90be090926043740df8f932f3d0bb32ea36e6317234277ee
SHA51232dbc9571dddd6c976d7d3b95b4a759ea9cb312e0657f1f2cc9b6457cf40a36ee490efff2f690d3461ed08f354d73fe050081366af6a5e243bdb544c4a5c3fb6
-
Filesize
1.1MB
MD56bf2a1527c48edcb5dea4c9035f5f6a6
SHA1af4ff58323b50fc383e7826b6e510c3766b415f4
SHA256935c658fbcf896ab36309ba83e4e9ff1d0bc0e7721df674eb7182de4c410b025
SHA5127fa6400bdc89298c04355647baecaf5e1878fcba6c2cb8ccc830f942525a179e05e725dd089e901ab043c64599cb2932ad18cc501fafcca3a5cb0acca8257ac6
-
Filesize
1.1MB
MD5e5dce86fbe51b6b9c33e111ed42f21f5
SHA11328cafafd57037ed3388fcd25b0aebf4aa5f419
SHA25651c714ba16c6ce2102af19d6ede6d59d1e227146bcf483d42425e84b4276568a
SHA51287e8869c91ab9111a4a23349a779d771208b977d5426d2a7d24661f308e45a05dd7567d92360dcb6f77fbd401cd3ddae00f85b39e87aeee70affb40ef5d5a49e
-
Filesize
827KB
MD5275d4e06a752f65c90e9cfdb8647c78c
SHA159665fe53b027056fc99d4ec1d985199ab77500e
SHA256ec3becadc28518911bbeb08f842442eb9d05c61147a523ba26951e955b3a1f9f
SHA51270500aa94fd530e5e1029d654c34243634abdf565f760b32bd67baa249c828cc9e12ffa125470b148237c97ee74381ed0d5069ae3e61968386ff904a4da3798c