Analysis
-
max time kernel
119s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 23:57
Behavioral task
behavioral1
Sample
26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe
Resource
win10v2004-20250129-en
General
-
Target
26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe
-
Size
2.2MB
-
MD5
baad2dc104aaba3159da075a87cb606e
-
SHA1
a3346f43df91c6df1cec3b048a14246d6e65bc46
-
SHA256
26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0
-
SHA512
4d629a023232b64db7489f2cba745466bf07dbf2813492c603f8594695fd187edff0002d9aad09ccae051a4e00c105c0094c4a37483220ce1509aa9e9d967475
-
SSDEEP
49152:ssSHlG56vO0T3/Nh/ptuw/C3TqGaDxr1NcWTMUvifq:sLlK6d3/Nh/bV/Oq3Dxp2RUGq
Malware Config
Signatures
-
DcRat 14 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 2636 schtasks.exe 2768 schtasks.exe 2608 schtasks.exe 2868 schtasks.exe 2776 schtasks.exe 2512 schtasks.exe 2664 schtasks.exe File created C:\Program Files\Google\5940a34987c991 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 2508 schtasks.exe 2208 schtasks.exe 2496 schtasks.exe 2236 schtasks.exe 668 schtasks.exe -
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Google\\dllhost.exe\"" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Google\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\audiodg.exe\"" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Google\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\audiodg.exe\", \"C:\\Program Files (x86)\\Microsoft Sync Framework\\v1.0\\Runtime\\x86\\OSPPSVC.exe\"" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Google\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\audiodg.exe\", \"C:\\Program Files (x86)\\Microsoft Sync Framework\\v1.0\\Runtime\\x86\\OSPPSVC.exe\", \"C:\\Users\\Admin\\PrintHood\\System.exe\"" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe -
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2636 2720 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 2720 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2496 2720 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2720 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 2720 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 2720 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2768 2720 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 2720 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 2720 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2208 2720 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 2720 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 668 2720 schtasks.exe 31 -
UAC bypass 3 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe -
resource yara_rule behavioral1/memory/1384-1-0x0000000000920000-0x0000000000B4E000-memory.dmp dcrat behavioral1/files/0x0005000000019f8a-41.dat dcrat behavioral1/files/0x000500000001a359-51.dat dcrat behavioral1/memory/2348-98-0x0000000001060000-0x000000000128E000-memory.dmp dcrat -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe -
Executes dropped EXE 2 IoCs
pid Process 2348 dllhost.exe 1748 dllhost.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\audiodg.exe\"" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files (x86)\\Microsoft Sync Framework\\v1.0\\Runtime\\x86\\OSPPSVC.exe\"" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files (x86)\\Microsoft Sync Framework\\v1.0\\Runtime\\x86\\OSPPSVC.exe\"" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Users\\Admin\\PrintHood\\System.exe\"" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Users\\Admin\\PrintHood\\System.exe\"" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files\\Google\\dllhost.exe\"" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files\\Google\\dllhost.exe\"" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\audiodg.exe\"" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe -
Checks whether UAC is enabled 1 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\Google\dllhost.exe 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe File created C:\Program Files\Google\5940a34987c991 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\OSPPSVC.exe 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe File created C:\Program Files\Google\dllhost.exe 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\1610b97d3ab4a7 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe File opened for modification C:\Program Files\Google\RCXEED4.tmp 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe File opened for modification C:\Program Files\Google\RCXEF42.tmp 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\RCXF35A.tmp 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\RCXF35B.tmp 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\OSPPSVC.exe 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\schemas\EAPHost\csrss.exe 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2496 schtasks.exe 2776 schtasks.exe 2768 schtasks.exe 2508 schtasks.exe 2208 schtasks.exe 2636 schtasks.exe 2868 schtasks.exe 2608 schtasks.exe 2236 schtasks.exe 668 schtasks.exe 2664 schtasks.exe 2512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe 2348 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Token: SeDebugPrivilege 2348 dllhost.exe Token: SeDebugPrivilege 1748 dllhost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1192 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 44 PID 1384 wrote to memory of 1192 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 44 PID 1384 wrote to memory of 1192 1384 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe 44 PID 1192 wrote to memory of 3068 1192 cmd.exe 46 PID 1192 wrote to memory of 3068 1192 cmd.exe 46 PID 1192 wrote to memory of 3068 1192 cmd.exe 46 PID 1192 wrote to memory of 2348 1192 cmd.exe 47 PID 1192 wrote to memory of 2348 1192 cmd.exe 47 PID 1192 wrote to memory of 2348 1192 cmd.exe 47 PID 2348 wrote to memory of 1396 2348 dllhost.exe 48 PID 2348 wrote to memory of 1396 2348 dllhost.exe 48 PID 2348 wrote to memory of 1396 2348 dllhost.exe 48 PID 2348 wrote to memory of 892 2348 dllhost.exe 49 PID 2348 wrote to memory of 892 2348 dllhost.exe 49 PID 2348 wrote to memory of 892 2348 dllhost.exe 49 PID 1396 wrote to memory of 1748 1396 WScript.exe 50 PID 1396 wrote to memory of 1748 1396 WScript.exe 50 PID 1396 wrote to memory of 1748 1396 WScript.exe 50 PID 1748 wrote to memory of 2580 1748 dllhost.exe 51 PID 1748 wrote to memory of 2580 1748 dllhost.exe 51 PID 1748 wrote to memory of 2580 1748 dllhost.exe 51 PID 1748 wrote to memory of 2596 1748 dllhost.exe 52 PID 1748 wrote to memory of 2596 1748 dllhost.exe 52 PID 1748 wrote to memory of 2596 1748 dllhost.exe 52 -
System policy modification 1 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe"C:\Users\Admin\AppData\Local\Temp\26e4874d6cade038fd82d89d732abe0eb6f26d6e0a5e5e24af8d36000f9abfc0.exe"1⤵
- DcRat
- Modifies WinLogon for persistence
- UAC bypass
- Drops file in Drivers directory
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1384 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FUrPKKMybJ.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3068
-
-
C:\Program Files\Google\dllhost.exe"C:\Program Files\Google\dllhost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2348 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\918f30a6-fc5c-4631-8a33-fc6f14a70514.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files\Google\dllhost.exe"C:\Program Files\Google\dllhost.exe"5⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1748 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\59f813a8-00ca-4387-bd82-97a65a448a22.vbs"6⤵PID:2580
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2c2c72e1-6f24-4ad9-90a5-92f4dfd3dfee.vbs"6⤵PID:2596
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b949619b-04cf-40ed-a328-f981336e4fe8.vbs"4⤵PID:892
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files\Google\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Google\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files\Google\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\audiodg.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\audiodg.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\audiodg.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\OSPPSVC.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\PrintHood\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Admin\PrintHood\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\PrintHood\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:668
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD51ba711ced12ac8a5b988806f598678a2
SHA1a62d98d5b06a80a96b6a1bb4248baa50fd8826a6
SHA25653890951c1c1e5e2dabb36933c50fe802364be3d35e1069b3b282acebd15a1fd
SHA5120c8f53ea178a8fe7c7db7a4aa6fdd7c89316361747574df9f90ddadb94c9a33d359848ed49ec4ba7e000e397707691e4b21514a8606159545b5013bc3b572506
-
Filesize
711B
MD5fd305e3cea4b86708ef133ec5e6d7598
SHA19dd2c473bd0b28ff2f6e122d1aca5ae63a5f7495
SHA25619463ab24a380f6715df8255e594fc74bbab8876e0147673d40ab9f169953f9c
SHA512d880fa0c32a0a9dcc0de761a48c2980bf28f2ef42c4177635e7723047c0328ef3e33a1dc6877341e4386a3f5a47604297efeb1618df7e68eb6f8dc2a31edbd08
-
Filesize
711B
MD5e89a6c0ade0a5ddf57271b45de2f226e
SHA1e8854edc7bfd789e4f9f047861592d945b380edb
SHA256bb1d0843501aa7f0d4426b39636a2a56cac374b0d389e8f1cbb4413679371f57
SHA5122451ae54d7362838541b73535faa33ec01fccbcbc9a25eb205f684fa9970eccd29c7e169a3e659d0e47c82d60feba3a2df011e4f3ed8b44cba2b1c8e9d44cc9e
-
Filesize
200B
MD5d0b5a2eda29edbaf2c807a3192bfea7e
SHA1ef17d4fca85a11686720e5fa14117812c1061f5a
SHA2564c600c1a96f8353568f1c5a28144f2a5895bc4f6cce138fc5beaa550407c51ca
SHA512c849a83e66bbc60acae47752ce1f8447649d91b7538f165c03df499817236c0236ef2b32a5b0cbc79793c138ae2fa5109997c5e8b5b7796ab2f408d014c14475
-
Filesize
2.2MB
MD5734f6915b07742d30bc125ff73f87d80
SHA1f5bbfbc8c5bd6ddb6329c3fca96261c787de0317
SHA256b0997cf70abbd1e112010f380df1a977ab85f38d6c410147fb65a5674b2f6be2
SHA512e9707ef0e75d94bea0c442cffde33aa74748b4c35471e45bab417dc5265f6ddb95e5d8edb55bf347a6a1d4881e50d85a75852f1acedf78a8892f44c708cee579
-
Filesize
487B
MD5279d14e48626824e351e28fbc919c8c9
SHA1f8f134c48a4a33827ec1f71d42695e36442231bb
SHA2566b280e5598427bcac1e41699959ee9110e98f406552f996368e216047a7064ad
SHA512c0cf6690a680db286d35b0a8e341dad1a9561779741b56939f3519c3b312dfd1e895c8825fbd7c2e2ade1e8f732436dd982a9b0589ffb78bd9668f49d400b127