Analysis
-
max time kernel
93s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 03:59
Behavioral task
behavioral1
Sample
121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe
Resource
win10v2004-20250129-en
General
-
Target
121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe
-
Size
2.5MB
-
MD5
fc27116ce1b57a71d7d201e9aae86b01
-
SHA1
ff047b7c918d9ff388b5c4928bfad5dcc818f1d4
-
SHA256
121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b
-
SHA512
25747516de2d99e6193fc920435ececf1b7ddb8990487d26d03cf6179b7dab0f5172c0dfa5d4db4a29028c00c12a9fb266bc14d6920e864d6a3934af7748618b
-
SSDEEP
49152:zx6mbB202bRTk7puPi9bOdL/+AmU0FwGkxKYFC19Jm/PKh:zUmbB20sRSuPi9bQL/+AmU0F7LS
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 30 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4604 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4556 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5116 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3536 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4356 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5052 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1704 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4560 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2288 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4908 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5012 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4712 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2824 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 532 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3088 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1316 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4224 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 732 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 536 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3672 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4164 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3036 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2280 4728 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 4728 schtasks.exe 86 -
UAC bypass 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe -
resource yara_rule behavioral2/memory/940-1-0x0000000000920000-0x0000000000B9A000-memory.dmp dcrat behavioral2/files/0x000a000000023b5b-25.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-70482961-775596374-3727440602-1000\Control Panel\International\Geo\Nation 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe -
Executes dropped EXE 1 IoCs
pid Process 4912 smss.exe -
Checks whether UAC is enabled 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA smss.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Portable Devices\smss.exe 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe File opened for modification C:\Program Files\Windows Portable Devices\smss.exe 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe File created C:\Program Files\Windows Portable Devices\69ddcba757bf72 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe File created C:\Program Files\Windows Mail\System.exe 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe File created C:\Program Files\Windows Mail\27d1bcfc3c54e0 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\es-ES\fontdrvhost.exe 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe File created C:\Windows\es-ES\5b884080fd4f94 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe File created C:\Windows\tracing\RuntimeBroker.exe 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe File created C:\Windows\tracing\9e8d7a4ca61bd9 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe File created C:\Windows\Migration\csrss.exe 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe File created C:\Windows\Migration\886983d96e3d3e 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-70482961-775596374-3727440602-1000_Classes\Local Settings 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 30 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3088 schtasks.exe 1700 schtasks.exe 5116 schtasks.exe 4356 schtasks.exe 4560 schtasks.exe 4712 schtasks.exe 2324 schtasks.exe 3536 schtasks.exe 1704 schtasks.exe 1316 schtasks.exe 4908 schtasks.exe 732 schtasks.exe 1972 schtasks.exe 5052 schtasks.exe 4164 schtasks.exe 3036 schtasks.exe 4556 schtasks.exe 4604 schtasks.exe 532 schtasks.exe 536 schtasks.exe 2280 schtasks.exe 5012 schtasks.exe 1684 schtasks.exe 3672 schtasks.exe 2908 schtasks.exe 4224 schtasks.exe 3024 schtasks.exe 2288 schtasks.exe 2824 schtasks.exe 2868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe 4912 smss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe Token: SeDebugPrivilege 4912 smss.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 940 wrote to memory of 32 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 117 PID 940 wrote to memory of 32 940 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe 117 PID 32 wrote to memory of 3432 32 cmd.exe 119 PID 32 wrote to memory of 3432 32 cmd.exe 119 PID 32 wrote to memory of 4912 32 cmd.exe 120 PID 32 wrote to memory of 4912 32 cmd.exe 120 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe"C:\Users\Admin\AppData\Local\Temp\121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:940 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\eVWXN0b0oR.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3432
-
-
C:\Program Files\Windows Portable Devices\smss.exe"C:\Program Files\Windows Portable Devices\smss.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4912
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Portable Devices\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Portable Devices\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Users\Public\AccountPictures\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Users\Public\AccountPictures\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Windows\es-ES\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\es-ES\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Windows\es-ES\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Windows\tracing\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\tracing\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Windows\tracing\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Windows\Migration\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Migration\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Windows\Migration\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Mail\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Mail\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1972
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5fc27116ce1b57a71d7d201e9aae86b01
SHA1ff047b7c918d9ff388b5c4928bfad5dcc818f1d4
SHA256121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b
SHA51225747516de2d99e6193fc920435ececf1b7ddb8990487d26d03cf6179b7dab0f5172c0dfa5d4db4a29028c00c12a9fb266bc14d6920e864d6a3934af7748618b
-
Filesize
215B
MD5871949dbb6f8c1009e42f02fee161eb1
SHA15c3d3b0e54c0cdb89c221c7b1beda632e102cb2b
SHA256dc1f706f01a0c0c42a89584175c29a8cba749199954f3e2ca8b8667ef7128d85
SHA512d367a2e7ca1787e7a3244a56ab53568410b68049480aff8ca7b22386e48a79bceb574a78d2e6a2bf2fea7383fbeb1ca4abbce001cab1502c7fa37a37231b3a37