Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 09:11
Static task
static1
Behavioral task
behavioral1
Sample
FCD38CBAA3982793517697BF89F666CC.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FCD38CBAA3982793517697BF89F666CC.exe
Resource
win10v2004-20250129-en
General
-
Target
FCD38CBAA3982793517697BF89F666CC.exe
-
Size
1.8MB
-
MD5
fcd38cbaa3982793517697bf89f666cc
-
SHA1
c345ceffabb9decaaa1e7a4f9582313401cbd589
-
SHA256
2c72479cc49731a95d2953c70e8ccf3a11eb154532aae68a7e7c7290797cb728
-
SHA512
8c5b64aa64dbc494e413b4e83b21c4f9bb0e3dd684a601c4faf1896e2f7d13cdb0885405b17839390358f823f4d61ea608b14f14e3f98d52a03778be64df0b9d
-
SSDEEP
24576:QNHIUS4ZU8NigrQ1JKwsy3CL3sZb2W2LimA2putPYrrJUHJZ5HwhJ5Ji2aaf1kWT:oII8LFCL3sZqd204AKHFgTI2aU1kW
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\dllhost.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Windows\\IdentityCRL\\INT\\sysmon.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Windows\\IdentityCRL\\INT\\sysmon.exe\", \"C:\\Users\\All Users\\SoftwareDistribution\\taskhostw.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Windows\\IdentityCRL\\INT\\sysmon.exe\", \"C:\\Users\\All Users\\SoftwareDistribution\\taskhostw.exe\", \"C:\\Program Files (x86)\\Windows Defender\\dllhost.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Windows\\IdentityCRL\\INT\\sysmon.exe\", \"C:\\Users\\All Users\\SoftwareDistribution\\taskhostw.exe\", \"C:\\Program Files (x86)\\Windows Defender\\dllhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\FCD38CBAA3982793517697BF89F666CC.exe\"" FCD38CBAA3982793517697BF89F666CC.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4080 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4928 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2080 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3440 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1564 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 640 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3152 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4816 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3748 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1592 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3704 3308 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5096 3308 schtasks.exe 86 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\Control Panel\International\Geo\Nation FCD38CBAA3982793517697BF89F666CC.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 taskhostw.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Windows\\IdentityCRL\\INT\\sysmon.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Windows\\IdentityCRL\\INT\\sysmon.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Users\\All Users\\SoftwareDistribution\\taskhostw.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Windows Defender\\dllhost.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Public\\dllhost.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Windows Defender\\dllhost.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FCD38CBAA3982793517697BF89F666CC = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\FCD38CBAA3982793517697BF89F666CC.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FCD38CBAA3982793517697BF89F666CC = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\FCD38CBAA3982793517697BF89F666CC.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Public\\dllhost.exe\"" FCD38CBAA3982793517697BF89F666CC.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Users\\All Users\\SoftwareDistribution\\taskhostw.exe\"" FCD38CBAA3982793517697BF89F666CC.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC4373E19363AD45A4AB15797FD6532B21.TMP csc.exe File created \??\c:\Windows\System32\mwcr4n.exe csc.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\dllhost.exe FCD38CBAA3982793517697BF89F666CC.exe File opened for modification C:\Program Files (x86)\Windows Defender\dllhost.exe FCD38CBAA3982793517697BF89F666CC.exe File created C:\Program Files (x86)\Windows Defender\5940a34987c991 FCD38CBAA3982793517697BF89F666CC.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\IdentityCRL\INT\121e5b5079f7c0 FCD38CBAA3982793517697BF89F666CC.exe File created C:\Windows\IdentityCRL\INT\sysmon.exe FCD38CBAA3982793517697BF89F666CC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1152 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000_Classes\Local Settings FCD38CBAA3982793517697BF89F666CC.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1152 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2248 schtasks.exe 4816 schtasks.exe 3748 schtasks.exe 5096 schtasks.exe 2080 schtasks.exe 2024 schtasks.exe 1564 schtasks.exe 640 schtasks.exe 3152 schtasks.exe 1736 schtasks.exe 1592 schtasks.exe 4928 schtasks.exe 2328 schtasks.exe 3440 schtasks.exe 2972 schtasks.exe 4080 schtasks.exe 2988 schtasks.exe 3704 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe 3764 FCD38CBAA3982793517697BF89F666CC.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3764 FCD38CBAA3982793517697BF89F666CC.exe Token: SeDebugPrivilege 2180 taskhostw.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3764 wrote to memory of 5008 3764 FCD38CBAA3982793517697BF89F666CC.exe 90 PID 3764 wrote to memory of 5008 3764 FCD38CBAA3982793517697BF89F666CC.exe 90 PID 5008 wrote to memory of 1800 5008 csc.exe 92 PID 5008 wrote to memory of 1800 5008 csc.exe 92 PID 3764 wrote to memory of 2460 3764 FCD38CBAA3982793517697BF89F666CC.exe 108 PID 3764 wrote to memory of 2460 3764 FCD38CBAA3982793517697BF89F666CC.exe 108 PID 2460 wrote to memory of 1860 2460 cmd.exe 110 PID 2460 wrote to memory of 1860 2460 cmd.exe 110 PID 2460 wrote to memory of 1152 2460 cmd.exe 111 PID 2460 wrote to memory of 1152 2460 cmd.exe 111 PID 2460 wrote to memory of 2180 2460 cmd.exe 115 PID 2460 wrote to memory of 2180 2460 cmd.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\FCD38CBAA3982793517697BF89F666CC.exe"C:\Users\Admin\AppData\Local\Temp\FCD38CBAA3982793517697BF89F666CC.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kcpsovag\kcpsovag.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8CFE.tmp" "c:\Windows\System32\CSC4373E19363AD45A4AB15797FD6532B21.TMP"3⤵PID:1800
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Gcc3qDKvxN.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1860
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1152
-
-
C:\Users\All Users\SoftwareDistribution\taskhostw.exe"C:\Users\All Users\SoftwareDistribution\taskhostw.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Users\Public\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Public\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Users\Public\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 5 /tr "'C:\Windows\IdentityCRL\INT\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\IdentityCRL\INT\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 9 /tr "'C:\Windows\IdentityCRL\INT\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\SoftwareDistribution\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\All Users\SoftwareDistribution\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\SoftwareDistribution\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Defender\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Defender\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "FCD38CBAA3982793517697BF89F666CCF" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\Local\Temp\FCD38CBAA3982793517697BF89F666CC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "FCD38CBAA3982793517697BF89F666CC" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\FCD38CBAA3982793517697BF89F666CC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "FCD38CBAA3982793517697BF89F666CCF" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Local\Temp\FCD38CBAA3982793517697BF89F666CC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5096
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD53d3478a4cd53bdaa470b2d504697c5c2
SHA1cc29aee4d94ec350dd01c199b6fb03271b32cff9
SHA256fd336c0e05dcb06d5e7a21876fbbe3a0cc04807a47add382cfa5072d86ec0d43
SHA512e11bb63ab54f546d64da2875560fb6e4cec1fe3cd3d62b524a6a90010be5d580e8eb91e66dbfef20beefaf180231460e2ac60e6283e543fbb4332cba41f8576c
-
Filesize
1KB
MD57e5499c266aed72cae35a68b3d5aaa6f
SHA1ce65fc58412359edf861aeddd1123588e2c46ce3
SHA2568449029b6593ed739109b21cb46af33c9440e72d484609d5116018b808a8a6b4
SHA5121c01baf897bec5fa08c6b33cf2b090b46df43955c1d9f66082bc25ae7ed606b40f73d64824a97ab8c25c4b491fb71d13c6a8b5a5c06c48284fe622e09f3805ee
-
Filesize
1.8MB
MD5fcd38cbaa3982793517697bf89f666cc
SHA1c345ceffabb9decaaa1e7a4f9582313401cbd589
SHA2562c72479cc49731a95d2953c70e8ccf3a11eb154532aae68a7e7c7290797cb728
SHA5128c5b64aa64dbc494e413b4e83b21c4f9bb0e3dd684a601c4faf1896e2f7d13cdb0885405b17839390358f823f4d61ea608b14f14e3f98d52a03778be64df0b9d
-
Filesize
359B
MD51901fbfd40639b52f3de7f58fa76dda7
SHA1d5917647ad60e77510f11fefe135ad7cd9b383dd
SHA256d3e24f6e43ad7e1deea6ad7f02f67239e806d639c54238c1a946f268265e096e
SHA5123ca054d527bcf53513971afdffe05bcbc39f95481d8e8e5701738ba3d985d00902dd8e6111b728e5600797f80e4e9cc79cfa485bd4ec224b5073248d95a055d9
-
Filesize
235B
MD5d7b21db8db3ecb380cfd8b6b7f5da352
SHA1208204d5580b499f8740e65448e63776aea7b26d
SHA256e5b5193c777229524bf54640c3ed811488cbcf6536490d8705f3269d47334e0b
SHA512b585e53e32f2e14e1951e792e990cb7dfb7cb947c80df5f7f3a8eb1a907412fb92c3c712bbe090ccb5914a242569f4e60c13359a993fac9ad1cb6a3821bc15d4
-
Filesize
1KB
MD5055343d2349db4836daceb1c553fb8db
SHA16d26ab027d2fe8077a70c255da49d43104c40c9c
SHA256725a99c4f34607ad0421d5d87b24adf97237cd9ec2457816436b00f3c0d7a22a
SHA5123b5460fbe57d9db9d12b274cebe02a20dfc3249097aeb3d543bb6d2332c7e79aa1bd4921ff254b457e8d545d5ea543b25d6d696a9cd93261838c5e941123438c