Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-01-2025 03:11
Behavioral task
behavioral1
Sample
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe
Resource
win10v2004-20250129-en
General
-
Target
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe
-
Size
2.7MB
-
MD5
a079d0ef7608f8fb08e6e67ebe720cdd
-
SHA1
612e4d36e0c92c850848ff92dc466fb2c956415b
-
SHA256
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274
-
SHA512
d2d4aa554c4bc1108dc73ee97dcb17fb66fdb862d64b10c08456fe62be5ff9d9e7b83a76956dbc2ffd855fb3a675d6939ee4416c4ebf2c55f060f7d0db93eb88
-
SSDEEP
49152:7bA3jfxSks5WqWk9IEJKb9aUgXXNOUnkonLxB5ctECb:7bwsgql9hJfUgX8+vc6i
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 528 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 676 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 536 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 860 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 444 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2448 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1500 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1456 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1496 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 576 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1108 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2504 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1544 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 408 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 3028 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1000 3028 schtasks.exe 36 -
resource yara_rule behavioral1/memory/2400-1-0x0000000001250000-0x0000000001510000-memory.dmp dcrat behavioral1/files/0x0007000000012117-5.dat dcrat behavioral1/files/0x00080000000174cc-27.dat dcrat behavioral1/memory/2708-28-0x0000000000D60000-0x0000000000FAE000-memory.dmp dcrat behavioral1/memory/1384-57-0x00000000003D0000-0x000000000061E000-memory.dmp dcrat -
Detected Nirsoft tools 2 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2400-1-0x0000000001250000-0x0000000001510000-memory.dmp Nirsoft behavioral1/files/0x00080000000173a9-10.dat Nirsoft -
Executes dropped EXE 4 IoCs
pid Process 2052 svchost.exe 2292 explorer.exe 2708 hyperComwin.exe 1384 explorer.exe -
Loads dropped DLL 4 IoCs
pid Process 2400 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 2400 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 2736 cmd.exe 2736 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Windows Portable Devices\explorer.exe hyperComwin.exe File created C:\Program Files\Windows Portable Devices\7a0fd90576e088 hyperComwin.exe File created C:\Program Files\Uninstall Information\services.exe hyperComwin.exe File created C:\Program Files\Uninstall Information\c5b4cb5e9653cc hyperComwin.exe File created C:\Program Files\VideoLAN\explorer.exe hyperComwin.exe File created C:\Program Files\VideoLAN\7a0fd90576e088 hyperComwin.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\IME\ja-JP\cmd.exe hyperComwin.exe File created C:\Windows\IME\ja-JP\ebf1f9fa8afd6d hyperComwin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1284 schtasks.exe 1496 schtasks.exe 1664 schtasks.exe 1000 schtasks.exe 860 schtasks.exe 576 schtasks.exe 1108 schtasks.exe 2056 schtasks.exe 1500 schtasks.exe 1940 schtasks.exe 2136 schtasks.exe 1948 schtasks.exe 528 schtasks.exe 676 schtasks.exe 536 schtasks.exe 2448 schtasks.exe 2980 schtasks.exe 2504 schtasks.exe 1544 schtasks.exe 408 schtasks.exe 2128 schtasks.exe 444 schtasks.exe 1692 schtasks.exe 1456 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2708 hyperComwin.exe 2708 hyperComwin.exe 2708 hyperComwin.exe 1384 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2292 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeBackupPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeBackupPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe Token: SeSecurityPrivilege 2292 explorer.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2052 2400 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 30 PID 2400 wrote to memory of 2052 2400 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 30 PID 2400 wrote to memory of 2052 2400 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 30 PID 2400 wrote to memory of 2052 2400 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 30 PID 2400 wrote to memory of 2292 2400 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 31 PID 2400 wrote to memory of 2292 2400 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 31 PID 2400 wrote to memory of 2292 2400 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 31 PID 2400 wrote to memory of 2292 2400 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 31 PID 2052 wrote to memory of 2832 2052 svchost.exe 32 PID 2052 wrote to memory of 2832 2052 svchost.exe 32 PID 2052 wrote to memory of 2832 2052 svchost.exe 32 PID 2052 wrote to memory of 2832 2052 svchost.exe 32 PID 2832 wrote to memory of 2736 2832 WScript.exe 33 PID 2832 wrote to memory of 2736 2832 WScript.exe 33 PID 2832 wrote to memory of 2736 2832 WScript.exe 33 PID 2832 wrote to memory of 2736 2832 WScript.exe 33 PID 2736 wrote to memory of 2708 2736 cmd.exe 35 PID 2736 wrote to memory of 2708 2736 cmd.exe 35 PID 2736 wrote to memory of 2708 2736 cmd.exe 35 PID 2736 wrote to memory of 2708 2736 cmd.exe 35 PID 2708 wrote to memory of 832 2708 hyperComwin.exe 61 PID 2708 wrote to memory of 832 2708 hyperComwin.exe 61 PID 2708 wrote to memory of 832 2708 hyperComwin.exe 61 PID 832 wrote to memory of 648 832 cmd.exe 63 PID 832 wrote to memory of 648 832 cmd.exe 63 PID 832 wrote to memory of 648 832 cmd.exe 63 PID 832 wrote to memory of 1384 832 cmd.exe 64 PID 832 wrote to memory of 1384 832 cmd.exe 64 PID 832 wrote to memory of 1384 832 cmd.exe 64 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe"C:\Users\Admin\AppData\Local\Temp\647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MsSession\Ov1RwD.vbe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\MsSession\K37wJmF1HmUF8ALyjA8MpCp.bat" "4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\MsSession\hyperComwin.exe"C:\MsSession\hyperComwin.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\oe1FTQSOF3.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:648
-
-
C:\Program Files\Windows Portable Devices\explorer.exe"C:\Program Files\Windows Portable Devices\explorer.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Portable Devices\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Portable Devices\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Libraries\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Public\Libraries\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Libraries\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Program Files\Uninstall Information\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Program Files\Uninstall Information\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Windows\IME\ja-JP\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\IME\ja-JP\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\Windows\IME\ja-JP\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files\VideoLAN\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files\VideoLAN\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\MsSession\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MsSession\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\MsSession\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Downloads\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Admin\Downloads\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Downloads\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30B
MD5fa3ead269fc71745ff9e202da56f658e
SHA15d2662e79f1e992c0c9f72c050cc676df0f3cdde
SHA2561cf1a92d3e3ce17a13d4827deb0cdb9f89a40116905980b547d7f954d59040a7
SHA5129e3c2ea4326648905360005b2aa95fb0e0935dc641b32af56446abf2bd69e9749c92f22e6eab4240da6505ffee6c1c3f5ed4ab6ac945f59fee2835aa2f9ec347
-
Filesize
209B
MD5f5a3f2ada233639fa06802ff18569f99
SHA1da11e9ad7bda556c74204c32691f3ec5efe8b6a5
SHA2563558ba240c76b6de27cdc3ac9370d6b50774aa2d5d5e3fe6a697e971e832aef9
SHA512ab223924c713a6551ded2a1e86d70533d7c1b8d5155f0d12b3b9e7fbc928ead6c452d3112484a6974b3be94b937a333d2b5f3f8852b0a21793d160689aca3ba9
-
Filesize
2.3MB
MD582fcc473fb802d134540a4d3bc9ddc06
SHA1d879feb817639baeeef685261d8574ab7944f8b2
SHA256f6cf6f23a7d27460b34f9ead8e72584a706ae1e986f3fa3920c51fbd0d6f93d0
SHA5126a67c4b0d98c04c8a86bdd7d3f6f72e1b0f7e3718c58c22a30004ac55c60dc53a36fc764bdee79d8aab981b863c203992abbaaaca788d200c9456ff3d0319cf2
-
Filesize
219B
MD580e408f84325430089b4be33c2bbb724
SHA10d26ea618208359c692d006484d83bf456fcedc5
SHA2563405d9515eeeaee8fd42abb98e6be7aa77fe4fa5d9e71e8ce3b71a9e5a6695d4
SHA512a1f2fbb5786f51772a832ba10228831a96a7c539446a69f02390fcd9ffb566abfec2da691a6569b04b115cef9f83c3ebb6ab5664f1b042a9e69a2b3ed88d699a
-
Filesize
130KB
MD5f27a284ef9b018cdd2a98a7b78ccdcb3
SHA167e260b11e6227c18cae8925b4f6899103c607f2
SHA256af86dc3f76d39b67b967a3b714e9e70ed43eec8d3871e9691cb45d84372b53fb
SHA5129a8811f13517748539308a70933b126a3348407f397bf30f903019379f927532c64015853b94acf21bdbc554d638a0265d4394d026e289103db06fe93fe5524b
-
Filesize
2.6MB
MD5eb81df2c7222c48ef46c781d460c83b9
SHA1c7fe4682e2c1bc5cc55c2913600f8950fe955129
SHA2561594a7f6707f01d3f1688f726af842940fe96fe700f99df23a3d8ec6909e4b13
SHA5126ce26f9d1f1f8f10d8dae13132217ca8aa2d42e98475ee0543f1cdd35f0a06f824f5ef8ab0db03b25c15041560464aa73c545d91d13d6fda72131c7ccc2c7c5b