Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 04:31
Behavioral task
behavioral1
Sample
a079d0ef7608f8fb08e6e67ebe720cdd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a079d0ef7608f8fb08e6e67ebe720cdd.exe
Resource
win10v2004-20241007-en
General
-
Target
a079d0ef7608f8fb08e6e67ebe720cdd.exe
-
Size
2.7MB
-
MD5
a079d0ef7608f8fb08e6e67ebe720cdd
-
SHA1
612e4d36e0c92c850848ff92dc466fb2c956415b
-
SHA256
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274
-
SHA512
d2d4aa554c4bc1108dc73ee97dcb17fb66fdb862d64b10c08456fe62be5ff9d9e7b83a76956dbc2ffd855fb3a675d6939ee4416c4ebf2c55f060f7d0db93eb88
-
SSDEEP
49152:7bA3jfxSks5WqWk9IEJKb9aUgXXNOUnkonLxB5ctECb:7bwsgql9hJfUgX8+vc6i
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4768 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3564 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1544 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3240 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4612 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 588 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2584 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1848 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1764 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1304 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3788 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2544 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3328 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3088 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4732 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1368 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3940 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3212 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4876 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3960 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1152 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2428 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 920 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3152 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4568 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1008 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1528 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 460 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4844 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 628 2380 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 2380 schtasks.exe 89 -
resource yara_rule behavioral2/memory/2964-1-0x0000000000DD0000-0x0000000001090000-memory.dmp dcrat behavioral2/files/0x0008000000023ca3-8.dat dcrat behavioral2/files/0x0007000000023cab-33.dat dcrat behavioral2/memory/3736-35-0x00000000009D0000-0x0000000000C1E000-memory.dmp dcrat -
Detected Nirsoft tools 2 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/2964-1-0x0000000000DD0000-0x0000000001090000-memory.dmp Nirsoft behavioral2/files/0x0007000000023ca7-14.dat Nirsoft -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation a079d0ef7608f8fb08e6e67ebe720cdd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation hyperComwin.exe -
Executes dropped EXE 4 IoCs
pid Process 4072 svchost.exe 1912 explorer.exe 3736 hyperComwin.exe 2556 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\886983d96e3d3e hyperComwin.exe File created C:\Program Files\Windows Defender\en-US\RuntimeBroker.exe hyperComwin.exe File created C:\Program Files (x86)\Reference Assemblies\0a1fd5f707cd16 hyperComwin.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\ee2ad38f3d4382 hyperComwin.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\csrss.exe hyperComwin.exe File created C:\Program Files\Windows Photo Viewer\es-ES\29c1c3cc0f7685 hyperComwin.exe File created C:\Program Files (x86)\Reference Assemblies\sppsvc.exe hyperComwin.exe File created C:\Program Files\dotnet\host\fxr\7.0.16\7a0fd90576e088 hyperComwin.exe File created C:\Program Files\Windows Photo Viewer\es-ES\unsecapp.exe hyperComwin.exe File created C:\Program Files\ModifiableWindowsApps\cmd.exe hyperComwin.exe File created C:\Program Files\Windows Defender\en-US\9e8d7a4ca61bd9 hyperComwin.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Registry.exe hyperComwin.exe File created C:\Program Files (x86)\Adobe\cmd.exe hyperComwin.exe File created C:\Program Files (x86)\Adobe\ebf1f9fa8afd6d hyperComwin.exe File created C:\Program Files\dotnet\host\fxr\7.0.16\explorer.exe hyperComwin.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\SystemResources\upfc.exe hyperComwin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a079d0ef7608f8fb08e6e67ebe720cdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1304 schtasks.exe 4732 schtasks.exe 3152 schtasks.exe 460 schtasks.exe 628 schtasks.exe 1544 schtasks.exe 2428 schtasks.exe 3960 schtasks.exe 588 schtasks.exe 2544 schtasks.exe 4768 schtasks.exe 3788 schtasks.exe 920 schtasks.exe 1060 schtasks.exe 2792 schtasks.exe 1848 schtasks.exe 2584 schtasks.exe 1368 schtasks.exe 1528 schtasks.exe 3564 schtasks.exe 3940 schtasks.exe 3212 schtasks.exe 4876 schtasks.exe 4612 schtasks.exe 1828 schtasks.exe 1008 schtasks.exe 4844 schtasks.exe 1764 schtasks.exe 3328 schtasks.exe 3088 schtasks.exe 1152 schtasks.exe 4568 schtasks.exe 3240 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3736 hyperComwin.exe 3736 hyperComwin.exe 3736 hyperComwin.exe 2556 cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeBackupPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeBackupPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe Token: SeSecurityPrivilege 1912 explorer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2964 wrote to memory of 4072 2964 a079d0ef7608f8fb08e6e67ebe720cdd.exe 83 PID 2964 wrote to memory of 4072 2964 a079d0ef7608f8fb08e6e67ebe720cdd.exe 83 PID 2964 wrote to memory of 4072 2964 a079d0ef7608f8fb08e6e67ebe720cdd.exe 83 PID 2964 wrote to memory of 1912 2964 a079d0ef7608f8fb08e6e67ebe720cdd.exe 84 PID 2964 wrote to memory of 1912 2964 a079d0ef7608f8fb08e6e67ebe720cdd.exe 84 PID 2964 wrote to memory of 1912 2964 a079d0ef7608f8fb08e6e67ebe720cdd.exe 84 PID 4072 wrote to memory of 3292 4072 svchost.exe 85 PID 4072 wrote to memory of 3292 4072 svchost.exe 85 PID 4072 wrote to memory of 3292 4072 svchost.exe 85 PID 3292 wrote to memory of 3556 3292 WScript.exe 86 PID 3292 wrote to memory of 3556 3292 WScript.exe 86 PID 3292 wrote to memory of 3556 3292 WScript.exe 86 PID 3556 wrote to memory of 3736 3556 cmd.exe 88 PID 3556 wrote to memory of 3736 3556 cmd.exe 88 PID 3736 wrote to memory of 2556 3736 hyperComwin.exe 124 PID 3736 wrote to memory of 2556 3736 hyperComwin.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a079d0ef7608f8fb08e6e67ebe720cdd.exe"C:\Users\Admin\AppData\Local\Temp\a079d0ef7608f8fb08e6e67ebe720cdd.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MsSession\Ov1RwD.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\MsSession\K37wJmF1HmUF8ALyjA8MpCp.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\MsSession\hyperComwin.exe"C:\MsSession\hyperComwin.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files (x86)\Adobe\cmd.exe"C:\Program Files (x86)\Adobe\cmd.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Reference Assemblies\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Reference Assemblies\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Adobe\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Adobe\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Program Files\dotnet\host\fxr\7.0.16\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\dotnet\host\fxr\7.0.16\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files\dotnet\host\fxr\7.0.16\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\es-ES\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Default User\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Defender\en-US\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\en-US\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Defender\en-US\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30B
MD5fa3ead269fc71745ff9e202da56f658e
SHA15d2662e79f1e992c0c9f72c050cc676df0f3cdde
SHA2561cf1a92d3e3ce17a13d4827deb0cdb9f89a40116905980b547d7f954d59040a7
SHA5129e3c2ea4326648905360005b2aa95fb0e0935dc641b32af56446abf2bd69e9749c92f22e6eab4240da6505ffee6c1c3f5ed4ab6ac945f59fee2835aa2f9ec347
-
Filesize
209B
MD5f5a3f2ada233639fa06802ff18569f99
SHA1da11e9ad7bda556c74204c32691f3ec5efe8b6a5
SHA2563558ba240c76b6de27cdc3ac9370d6b50774aa2d5d5e3fe6a697e971e832aef9
SHA512ab223924c713a6551ded2a1e86d70533d7c1b8d5155f0d12b3b9e7fbc928ead6c452d3112484a6974b3be94b937a333d2b5f3f8852b0a21793d160689aca3ba9
-
Filesize
2.3MB
MD582fcc473fb802d134540a4d3bc9ddc06
SHA1d879feb817639baeeef685261d8574ab7944f8b2
SHA256f6cf6f23a7d27460b34f9ead8e72584a706ae1e986f3fa3920c51fbd0d6f93d0
SHA5126a67c4b0d98c04c8a86bdd7d3f6f72e1b0f7e3718c58c22a30004ac55c60dc53a36fc764bdee79d8aab981b863c203992abbaaaca788d200c9456ff3d0319cf2
-
Filesize
130KB
MD5f27a284ef9b018cdd2a98a7b78ccdcb3
SHA167e260b11e6227c18cae8925b4f6899103c607f2
SHA256af86dc3f76d39b67b967a3b714e9e70ed43eec8d3871e9691cb45d84372b53fb
SHA5129a8811f13517748539308a70933b126a3348407f397bf30f903019379f927532c64015853b94acf21bdbc554d638a0265d4394d026e289103db06fe93fe5524b
-
Filesize
2.6MB
MD5eb81df2c7222c48ef46c781d460c83b9
SHA1c7fe4682e2c1bc5cc55c2913600f8950fe955129
SHA2561594a7f6707f01d3f1688f726af842940fe96fe700f99df23a3d8ec6909e4b13
SHA5126ce26f9d1f1f8f10d8dae13132217ca8aa2d42e98475ee0543f1cdd35f0a06f824f5ef8ab0db03b25c15041560464aa73c545d91d13d6fda72131c7ccc2c7c5b