Analysis
-
max time kernel
120s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 03:19
Behavioral task
behavioral1
Sample
534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe
Resource
win10v2004-20241007-en
General
-
Target
534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe
-
Size
2.7MB
-
MD5
3dce7fce69c35c15988ad7bc647d4681
-
SHA1
bf0b951d922c6e92e40cec56f641a0c48da49b57
-
SHA256
534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb
-
SHA512
99e11b00a61b901a0954dbdd6c1b533c2898662584ea296fd1a92b790ffe10690cf2acba4b595e9d517fc3088ec03450c1d1ee1ce9ae8cfe1a15f24ae14ad33e
-
SSDEEP
49152:Ano0OKQIQaPECv3la9Bc0JpOkFl5B9LzYSbqtR6v:hMvlyG0JpOG50SbOg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 39 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2164 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2788 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2368 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 812 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2516 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1212 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2540 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1136 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2948 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 940 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 836 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 944 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1312 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1076 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2400 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 876 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 676 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 108 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1776 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2072 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1128 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1620 2804 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 2804 schtasks.exe 30 -
UAC bypass 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe -
resource yara_rule behavioral1/memory/2004-1-0x00000000010F0000-0x00000000013A4000-memory.dmp dcrat behavioral1/files/0x00070000000195b3-28.dat dcrat behavioral1/files/0x000500000001a7f7-95.dat dcrat behavioral1/files/0x000d00000001948c-127.dat dcrat behavioral1/files/0x000700000001a3ab-140.dat dcrat behavioral1/files/0x000800000001a3fd-163.dat dcrat behavioral1/files/0x000900000001a459-185.dat dcrat behavioral1/memory/1320-209-0x0000000000B20000-0x0000000000DD4000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 1320 explorer.exe -
Checks whether UAC is enabled 1 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\wininit.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File created C:\Program Files (x86)\Common Files\explorer.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files\Windows Sidebar\RCXA681.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\RCXB29B.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files\7-Zip\Lang\RCXB7CD.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files\7-Zip\Lang\wininit.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File created C:\Program Files (x86)\Common Files\DESIGNER\0a1fd5f707cd16 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files\Windows Portable Devices\RCXA8A5.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files (x86)\Common Files\RCXC0A9.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files (x86)\Common Files\RCXC127.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File created C:\Program Files (x86)\Common Files\DESIGNER\sppsvc.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File created C:\Program Files (x86)\Common Files\7a0fd90576e088 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files\Windows Sidebar\services.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files\Windows Portable Devices\RCXA895.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\RCXAB56.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\sppsvc.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File created C:\Program Files\Windows Sidebar\services.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File created C:\Program Files\Windows Sidebar\c5b4cb5e9653cc 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\System.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File created C:\Program Files\7-Zip\Lang\56085415360792 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files\Windows Portable Devices\spoolsv.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\RCXAAC8.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File created C:\Program Files\Windows Portable Devices\spoolsv.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File created C:\Program Files\Windows Portable Devices\f3b6ecef712a24 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files\Windows Sidebar\RCXA680.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\System.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files\7-Zip\Lang\RCXB7DE.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files (x86)\Common Files\explorer.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\27d1bcfc3c54e0 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\RCXB319.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Idle.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File created C:\Windows\AppCompat\Programs\6ccacd8608530f 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Windows\AppCompat\Programs\RCXBCD0.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Windows\AppCompat\Programs\RCXBEA5.tmp 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe File opened for modification C:\Windows\AppCompat\Programs\Idle.exe 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 39 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2368 schtasks.exe 2436 schtasks.exe 2128 schtasks.exe 2400 schtasks.exe 2608 schtasks.exe 2792 schtasks.exe 1164 schtasks.exe 1128 schtasks.exe 1620 schtasks.exe 2328 schtasks.exe 1212 schtasks.exe 2592 schtasks.exe 2176 schtasks.exe 1776 schtasks.exe 108 schtasks.exe 2516 schtasks.exe 2044 schtasks.exe 836 schtasks.exe 1312 schtasks.exe 2372 schtasks.exe 2164 schtasks.exe 2828 schtasks.exe 2948 schtasks.exe 972 schtasks.exe 2788 schtasks.exe 812 schtasks.exe 2540 schtasks.exe 1136 schtasks.exe 876 schtasks.exe 2676 schtasks.exe 2432 schtasks.exe 940 schtasks.exe 944 schtasks.exe 2168 schtasks.exe 676 schtasks.exe 2844 schtasks.exe 1076 schtasks.exe 2072 schtasks.exe 908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2004 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe 2004 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe 2004 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe 1320 explorer.exe 1320 explorer.exe 1320 explorer.exe 1320 explorer.exe 1320 explorer.exe 1320 explorer.exe 1320 explorer.exe 1320 explorer.exe 1320 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1320 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2004 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe Token: SeDebugPrivilege 1320 explorer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1320 2004 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe 70 PID 2004 wrote to memory of 1320 2004 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe 70 PID 2004 wrote to memory of 1320 2004 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe 70 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe"C:\Users\Admin\AppData\Local\Temp\534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2004 -
C:\Program Files (x86)\Common Files\explorer.exe"C:\Program Files (x86)\Common Files\explorer.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1320
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Sidebar\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Portable Devices\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Portable Devices\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\DESIGNER\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb5" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Libraries\534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb" /sc ONLOGON /tr "'C:\Users\Public\Libraries\534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb5" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Libraries\534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Documents\My Videos\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\Public\Documents\My Videos\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Documents\My Videos\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\Lang\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\Lang\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Windows\AppCompat\Programs\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\AppCompat\Programs\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Windows\AppCompat\Programs\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Common Files\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Common Files\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2676
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD594c12072e44b5e58839217afa5ffe4da
SHA199cac99d3fd9b01bf553f008e7068967d7707a38
SHA2560ef1303f07cc13dc188188896e413948f1b5c62bf870ccccf124e47d1c9700a4
SHA512d1eb411f77b54a882046139a6faf763a1b6338f1b10eef9fa577b9ca433494760366309fc2eab30f6500d3430084c008e0ff1579f6736eb1eac6107196320480
-
Filesize
2.7MB
MD50d9b8e1b30a91335167caf5a8c886caa
SHA15d7b94cd7eb55c276c7351b12b458df43c2b675c
SHA256665453e30efa11a0b11be6902a7954de76ca97524903dd7bd860e101a3617126
SHA512dda1f8ae7c1eb0a5389e5ad8db229a0c4fdf8e7ccebb72e3d8514d35369c8e0aa6953df4f8277d254f097b27db1ba7c4aad807b9fac675f3a91f8bcddac040b2
-
Filesize
2.7MB
MD56754cb57e07758068c5e3ae03956daac
SHA19eaa02212ebb45db61f317ccf21100d467babd63
SHA256633ebf5fe57b92817b6b0da75ed941904fc2fde7605d68d0a028644146aea123
SHA512debaba7aaa3b0f94e3d608bdd8786bbc2c478e6598088b2702df59d90190c6d88865a350a0dedfb65a3951f4231d715370cda6790015ff681980012aa852fb98
-
Filesize
2.7MB
MD5907e30b5496641d2b937af997eca7b4f
SHA1ce594ad073ed75510b9b57312019cfd17aae7071
SHA256bd3ff38867612edb57c7fab2f62bc8b48fc92b6c170befacec0e7d290bf4fcc3
SHA5124d5160972a11fb7b6024535dbc3cdcb51a2f4b02f974d897234943d9812630710019925d78b9d8f3f4fbab82dd4aa4c30c1bf9f1262b1e8a11b7e9d76c918227
-
Filesize
2.7MB
MD53dce7fce69c35c15988ad7bc647d4681
SHA1bf0b951d922c6e92e40cec56f641a0c48da49b57
SHA256534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb
SHA51299e11b00a61b901a0954dbdd6c1b533c2898662584ea296fd1a92b790ffe10690cf2acba4b595e9d517fc3088ec03450c1d1ee1ce9ae8cfe1a15f24ae14ad33e
-
Filesize
2.7MB
MD5732121d3ba92b3d5c709e71895ae2782
SHA1dd7ebd3c8d7987d3caa8703aab5108b260615ef8
SHA25600ac69e302d6e1f9f8413d769e2281df19181add2c7c4edd447788362534d608
SHA5126f9261328f7984c6ae62b837d54cc125f4c763526f9b432b4f385d11063245d3bdf5557802fc9801bcf4441a1bc923045c83c4461661be48e84447e258b38c63