Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 03:32
Behavioral task
behavioral1
Sample
c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe
Resource
win10v2004-20250129-en
General
-
Target
c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe
-
Size
827KB
-
MD5
b75ce2dd6d4635f56d18407c6dd6a3e0
-
SHA1
42360f11f12bbfb0c7f8ce1f793d463f4b3b49f5
-
SHA256
c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67
-
SHA512
bdd693058101ed735339ab4b71d643fb4b8bb6a21c2f0b365fc13228a01f2d10a7a0fbe85dd6ebbf10f31dd5a5052fc2c7df83b659ad73128e55058dc635fa16
-
SSDEEP
12288:+PjbkdQsEdvdRDnB0WmNN3D+nvIsmnxkmt7IxcC1A:+rbQQsE9WWmNNz+wpxlyxcMA
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4324 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3380 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4844 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3540 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3524 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4444 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3168 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4744 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3552 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4228 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4856 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2472 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3228 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5104 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3628 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1132 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3416 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3152 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3512 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1144 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1824 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3932 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3276 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5108 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5024 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4468 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4900 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 696 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4548 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3580 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4536 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4880 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1764 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5080 964 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3244 964 schtasks.exe 83 -
resource yara_rule behavioral2/memory/3480-1-0x0000000000560000-0x0000000000636000-memory.dmp dcrat behavioral2/files/0x000a000000023b83-11.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\Control Panel\International\Geo\Nation c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe -
Executes dropped EXE 1 IoCs
pid Process 3428 explorer.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File created C:\Program Files\Windows Mail\csrss.exe c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\explorer.exe c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\7a0fd90576e088 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File created C:\Program Files\Windows Mail\886983d96e3d3e c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\StartMenuExperienceHost.exe c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\55b276f4edf653 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File created C:\Program Files\7-Zip\Lang\SppExtComObj.exe c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File created C:\Program Files\7-Zip\Lang\e1ef82546f0b02 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File created C:\Program Files\7-Zip\TextInputHost.exe c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\en-US\explorer.exe c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File created C:\Program Files\7-Zip\22eafd247d37c3 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\uk-UA\Registry.exe c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File created C:\Windows\uk-UA\ee2ad38f3d4382 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File created C:\Windows\ServiceProfiles\RuntimeBroker.exe c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File created C:\Windows\ServiceProfiles\9e8d7a4ca61bd9 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe File created C:\Windows\CSC\sysmon.exe c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000_Classes\Local Settings c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4324 schtasks.exe 2472 schtasks.exe 1088 schtasks.exe 3416 schtasks.exe 3152 schtasks.exe 5108 schtasks.exe 5080 schtasks.exe 4228 schtasks.exe 5104 schtasks.exe 1148 schtasks.exe 3244 schtasks.exe 1064 schtasks.exe 3380 schtasks.exe 1736 schtasks.exe 3540 schtasks.exe 3524 schtasks.exe 4444 schtasks.exe 4856 schtasks.exe 3228 schtasks.exe 3932 schtasks.exe 1724 schtasks.exe 4900 schtasks.exe 4536 schtasks.exe 4844 schtasks.exe 3628 schtasks.exe 2120 schtasks.exe 1144 schtasks.exe 2592 schtasks.exe 696 schtasks.exe 4880 schtasks.exe 1740 schtasks.exe 2044 schtasks.exe 3512 schtasks.exe 1824 schtasks.exe 5024 schtasks.exe 4548 schtasks.exe 3168 schtasks.exe 3580 schtasks.exe 4744 schtasks.exe 3552 schtasks.exe 1132 schtasks.exe 1948 schtasks.exe 3276 schtasks.exe 4468 schtasks.exe 1764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 3428 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe Token: SeDebugPrivilege 3428 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3480 wrote to memory of 4064 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 132 PID 3480 wrote to memory of 4064 3480 c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe 132 PID 4064 wrote to memory of 3232 4064 cmd.exe 134 PID 4064 wrote to memory of 3232 4064 cmd.exe 134 PID 4064 wrote to memory of 3428 4064 cmd.exe 135 PID 4064 wrote to memory of 3428 4064 cmd.exe 135 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe"C:\Users\Admin\AppData\Local\Temp\c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2aOBtbKf1c.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3232
-
-
C:\Program Files\Windows Security\BrowserCore\en-US\explorer.exe"C:\Program Files\Windows Security\BrowserCore\en-US\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Mail\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Mail\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Windows\ServiceProfiles\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Windows\ServiceProfiles\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Default User\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:\Program Files\7-Zip\Lang\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\Lang\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Desktop\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Default\Desktop\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Users\Default\Desktop\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Start Menu\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\All Users\Start Menu\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Start Menu\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\MusNotification.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Users\Default User\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Windows\uk-UA\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\uk-UA\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Windows\uk-UA\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Users\Default\Cookies\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default\Cookies\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Cookies\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 7 /tr "'C:\Program Files\7-Zip\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\7-Zip\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Program Files\7-Zip\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Recent\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Admin\Recent\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Recent\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229B
MD5dae8526a193f1f09cbd3aab4a7adc1a4
SHA1f72046e607ff46e24c6865e677c00dccbfa919bc
SHA2562780f2dc3bf3fb21ad16bcb792fe251c27a6749973d4e405824e103b0fac17fb
SHA512bb786e400a90cac78360219ba290c1dded46e8ab82d4ab49ce09874a8186201b937f79a8d1b24ab4b188d9bf539e510c01f0bfd8d2c0a4e736c4aa4bdf135c4a
-
Filesize
827KB
MD5b75ce2dd6d4635f56d18407c6dd6a3e0
SHA142360f11f12bbfb0c7f8ce1f793d463f4b3b49f5
SHA256c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67
SHA512bdd693058101ed735339ab4b71d643fb4b8bb6a21c2f0b365fc13228a01f2d10a7a0fbe85dd6ebbf10f31dd5a5052fc2c7df83b659ad73128e55058dc635fa16