Analysis
-
max time kernel
95s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 03:11
Behavioral task
behavioral1
Sample
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe
Resource
win10v2004-20250129-en
General
-
Target
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe
-
Size
2.7MB
-
MD5
a079d0ef7608f8fb08e6e67ebe720cdd
-
SHA1
612e4d36e0c92c850848ff92dc466fb2c956415b
-
SHA256
647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274
-
SHA512
d2d4aa554c4bc1108dc73ee97dcb17fb66fdb862d64b10c08456fe62be5ff9d9e7b83a76956dbc2ffd855fb3a675d6939ee4416c4ebf2c55f060f7d0db93eb88
-
SSDEEP
49152:7bA3jfxSks5WqWk9IEJKb9aUgXXNOUnkonLxB5ctECb:7bwsgql9hJfUgX8+vc6i
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3496 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5072 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3416 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1108 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1012 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3752 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2320 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1400 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 532 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4776 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4220 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4144 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3816 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4152 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1832 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4500 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4480 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4404 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1132 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3308 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1104 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 856 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4148 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3096 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1212 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4620 1840 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4288 1840 schtasks.exe 90 -
resource yara_rule behavioral2/memory/688-1-0x00000000008C0000-0x0000000000B80000-memory.dmp dcrat behavioral2/files/0x000e000000023b16-8.dat dcrat behavioral2/files/0x000a000000023b4d-33.dat dcrat behavioral2/memory/4844-35-0x0000000000D90000-0x0000000000FDE000-memory.dmp dcrat -
Detected Nirsoft tools 2 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/688-1-0x00000000008C0000-0x0000000000B80000-memory.dmp Nirsoft behavioral2/files/0x000b000000023b47-14.dat Nirsoft -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation hyperComwin.exe Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4956 svchost.exe 1916 explorer.exe 4844 hyperComwin.exe 3808 smss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\Windows Photo Viewer\uk-UA\csrss.exe hyperComwin.exe File created C:\Program Files (x86)\Windows Multimedia Platform\dllhost.exe hyperComwin.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\5b884080fd4f94 hyperComwin.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\backgroundTaskHost.exe hyperComwin.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\eddb19405b7ce1 hyperComwin.exe File created C:\Program Files (x86)\Windows Multimedia Platform\5940a34987c991 hyperComwin.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\RuntimeBroker.exe hyperComwin.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\9e8d7a4ca61bd9 hyperComwin.exe File created C:\Program Files\Windows Photo Viewer\uk-UA\886983d96e3d3e hyperComwin.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\fontdrvhost.exe hyperComwin.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\CSC\RuntimeBroker.exe hyperComwin.exe File created C:\Windows\DigitalLocker\services.exe hyperComwin.exe File created C:\Windows\DigitalLocker\c5b4cb5e9653cc hyperComwin.exe File created C:\Windows\CSC\dwm.exe hyperComwin.exe File created C:\Windows\PolicyDefinitions\en-US\hyperComwin.exe hyperComwin.exe File created C:\Windows\PolicyDefinitions\en-US\9fe2562972643b hyperComwin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings hyperComwin.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2492 schtasks.exe 1108 schtasks.exe 4776 schtasks.exe 2028 schtasks.exe 2920 schtasks.exe 1132 schtasks.exe 856 schtasks.exe 5072 schtasks.exe 1628 schtasks.exe 4620 schtasks.exe 1104 schtasks.exe 4144 schtasks.exe 4500 schtasks.exe 4480 schtasks.exe 4404 schtasks.exe 3096 schtasks.exe 1212 schtasks.exe 2320 schtasks.exe 3416 schtasks.exe 4152 schtasks.exe 3020 schtasks.exe 3496 schtasks.exe 3816 schtasks.exe 4288 schtasks.exe 4220 schtasks.exe 1684 schtasks.exe 1400 schtasks.exe 1832 schtasks.exe 3308 schtasks.exe 1012 schtasks.exe 532 schtasks.exe 4148 schtasks.exe 3752 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 4844 hyperComwin.exe 3808 smss.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeBackupPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeBackupPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe Token: SeSecurityPrivilege 1916 explorer.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 688 wrote to memory of 4956 688 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 84 PID 688 wrote to memory of 4956 688 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 84 PID 688 wrote to memory of 4956 688 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 84 PID 688 wrote to memory of 1916 688 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 85 PID 688 wrote to memory of 1916 688 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 85 PID 688 wrote to memory of 1916 688 647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe 85 PID 4956 wrote to memory of 2684 4956 svchost.exe 86 PID 4956 wrote to memory of 2684 4956 svchost.exe 86 PID 4956 wrote to memory of 2684 4956 svchost.exe 86 PID 2684 wrote to memory of 3512 2684 WScript.exe 87 PID 2684 wrote to memory of 3512 2684 WScript.exe 87 PID 2684 wrote to memory of 3512 2684 WScript.exe 87 PID 3512 wrote to memory of 4844 3512 cmd.exe 89 PID 3512 wrote to memory of 4844 3512 cmd.exe 89 PID 4844 wrote to memory of 2628 4844 hyperComwin.exe 124 PID 4844 wrote to memory of 2628 4844 hyperComwin.exe 124 PID 2628 wrote to memory of 1736 2628 cmd.exe 126 PID 2628 wrote to memory of 1736 2628 cmd.exe 126 PID 2628 wrote to memory of 3808 2628 cmd.exe 127 PID 2628 wrote to memory of 3808 2628 cmd.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe"C:\Users\Admin\AppData\Local\Temp\647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MsSession\Ov1RwD.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\MsSession\K37wJmF1HmUF8ALyjA8MpCp.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\MsSession\hyperComwin.exe"C:\MsSession\hyperComwin.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aINWZcLocN.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:1736
-
-
C:\MsSession\smss.exe"C:\MsSession\smss.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3808
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\MsSession\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\MsSession\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\MsSession\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Windows\DigitalLocker\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\DigitalLocker\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Windows\DigitalLocker\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Photo Viewer\uk-UA\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\uk-UA\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Photo Viewer\uk-UA\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "hyperComwinh" /sc MINUTE /mo 12 /tr "'C:\Windows\PolicyDefinitions\en-US\hyperComwin.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "hyperComwin" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\en-US\hyperComwin.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "hyperComwinh" /sc MINUTE /mo 14 /tr "'C:\Windows\PolicyDefinitions\en-US\hyperComwin.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\MsSession\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MsSession\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\MsSession\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30B
MD5fa3ead269fc71745ff9e202da56f658e
SHA15d2662e79f1e992c0c9f72c050cc676df0f3cdde
SHA2561cf1a92d3e3ce17a13d4827deb0cdb9f89a40116905980b547d7f954d59040a7
SHA5129e3c2ea4326648905360005b2aa95fb0e0935dc641b32af56446abf2bd69e9749c92f22e6eab4240da6505ffee6c1c3f5ed4ab6ac945f59fee2835aa2f9ec347
-
Filesize
209B
MD5f5a3f2ada233639fa06802ff18569f99
SHA1da11e9ad7bda556c74204c32691f3ec5efe8b6a5
SHA2563558ba240c76b6de27cdc3ac9370d6b50774aa2d5d5e3fe6a697e971e832aef9
SHA512ab223924c713a6551ded2a1e86d70533d7c1b8d5155f0d12b3b9e7fbc928ead6c452d3112484a6974b3be94b937a333d2b5f3f8852b0a21793d160689aca3ba9
-
Filesize
2.3MB
MD582fcc473fb802d134540a4d3bc9ddc06
SHA1d879feb817639baeeef685261d8574ab7944f8b2
SHA256f6cf6f23a7d27460b34f9ead8e72584a706ae1e986f3fa3920c51fbd0d6f93d0
SHA5126a67c4b0d98c04c8a86bdd7d3f6f72e1b0f7e3718c58c22a30004ac55c60dc53a36fc764bdee79d8aab981b863c203992abbaaaca788d200c9456ff3d0319cf2
-
Filesize
186B
MD57446cbef82b7afb22b905ca21cbf2492
SHA1199be600eb50c54786f8f94ec52cad535d06751b
SHA2563f141650181bac098f3ba8a78662dfc0a0b80e84b96546ce124e91a1efc82a7a
SHA512aa6e17cc9f158f743043bb79364f3f8a46703cdcdbd2c6a212ab4227a5530f642a2093273f3d5509e79c9bc1d236987da999c3b679da4079c843679fd3f7e71b
-
Filesize
130KB
MD5f27a284ef9b018cdd2a98a7b78ccdcb3
SHA167e260b11e6227c18cae8925b4f6899103c607f2
SHA256af86dc3f76d39b67b967a3b714e9e70ed43eec8d3871e9691cb45d84372b53fb
SHA5129a8811f13517748539308a70933b126a3348407f397bf30f903019379f927532c64015853b94acf21bdbc554d638a0265d4394d026e289103db06fe93fe5524b
-
Filesize
2.6MB
MD5eb81df2c7222c48ef46c781d460c83b9
SHA1c7fe4682e2c1bc5cc55c2913600f8950fe955129
SHA2561594a7f6707f01d3f1688f726af842940fe96fe700f99df23a3d8ec6909e4b13
SHA5126ce26f9d1f1f8f10d8dae13132217ca8aa2d42e98475ee0543f1cdd35f0a06f824f5ef8ab0db03b25c15041560464aa73c545d91d13d6fda72131c7ccc2c7c5b