Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2025 09:40

General

  • Target

    007c92b8ad2188efb216f2699a386238.exe

  • Size

    1.1MB

  • MD5

    007c92b8ad2188efb216f2699a386238

  • SHA1

    c780a61bde93f59fa404ed217707f99e86f0c1fd

  • SHA256

    f1eec0d8c323b0db81ee756d99d00020cf1f7602e4dc158b82c973e9fb5750fc

  • SHA512

    df65a0fb78ec1453921c8861f73d6dc8379797646d6aa66b7d20ea06bf7688fe4f009d720565c5075724a0da0d657b2bcdc5c4c0717e9ffcabf3d54123ce9e3b

  • SSDEEP

    24576:U2G/nvxW3Ww0tSUtIrZBMreAydD8FVgMjt2:UbA30SaIrfAUD8rM

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 48 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 16 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
  • Drops file in Program Files directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\007c92b8ad2188efb216f2699a386238.exe
    "C:\Users\Admin\AppData\Local\Temp\007c92b8ad2188efb216f2699a386238.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\blockdriverintoRefdhcp\zjUQC6Kcs7ptRMsTAo49SRrfh.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\blockdriverintoRefdhcp\IJdp5Y1jjSlcQsS9.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1476
        • C:\blockdriverintoRefdhcp\componentMonitornet.exe
          "C:\blockdriverintoRefdhcp\componentMonitornet.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4056
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LfRsrCSxKQ.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3900
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:1336
              • C:\Program Files (x86)\Windows Portable Devices\dwm.exe
                "C:\Program Files (x86)\Windows Portable Devices\dwm.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:5104
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FaowIOOII5.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4336
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    8⤵
                      PID:5004
                    • C:\Program Files (x86)\Windows Portable Devices\dwm.exe
                      "C:\Program Files (x86)\Windows Portable Devices\dwm.exe"
                      8⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2412
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AXFqcUy7ES.bat"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2248
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          10⤵
                            PID:1656
                          • C:\Program Files (x86)\Windows Portable Devices\dwm.exe
                            "C:\Program Files (x86)\Windows Portable Devices\dwm.exe"
                            10⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2640
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\EOJxze5tr1.bat"
                              11⤵
                              • Suspicious use of WriteProcessMemory
                              PID:1104
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                12⤵
                                  PID:4976
                                • C:\Program Files (x86)\Windows Portable Devices\dwm.exe
                                  "C:\Program Files (x86)\Windows Portable Devices\dwm.exe"
                                  12⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:3532
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZDYK5nApHO.bat"
                                    13⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:3088
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      14⤵
                                        PID:900
                                      • C:\Program Files (x86)\Windows Portable Devices\dwm.exe
                                        "C:\Program Files (x86)\Windows Portable Devices\dwm.exe"
                                        14⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:2708
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\syea0WjfTx.bat"
                                          15⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:1560
                                          • C:\Windows\system32\w32tm.exe
                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                            16⤵
                                              PID:4920
                                            • C:\Program Files (x86)\Windows Portable Devices\dwm.exe
                                              "C:\Program Files (x86)\Windows Portable Devices\dwm.exe"
                                              16⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Modifies registry class
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of WriteProcessMemory
                                              PID:3712
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\or7X1gMNi7.bat"
                                                17⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:4412
                                                • C:\Windows\system32\w32tm.exe
                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                  18⤵
                                                    PID:4624
                                                  • C:\Program Files (x86)\Windows Portable Devices\dwm.exe
                                                    "C:\Program Files (x86)\Windows Portable Devices\dwm.exe"
                                                    18⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:3796
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BikqvEHWfW.bat"
                                                      19⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:1896
                                                      • C:\Windows\system32\w32tm.exe
                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                        20⤵
                                                          PID:5004
                                                        • C:\Program Files (x86)\Windows Portable Devices\dwm.exe
                                                          "C:\Program Files (x86)\Windows Portable Devices\dwm.exe"
                                                          20⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:4756
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4oJokgKWVw.bat"
                                                            21⤵
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:3192
                                                            • C:\Windows\system32\w32tm.exe
                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                              22⤵
                                                                PID:5096
                                                              • C:\Program Files (x86)\Windows Portable Devices\dwm.exe
                                                                "C:\Program Files (x86)\Windows Portable Devices\dwm.exe"
                                                                22⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:4184
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1n8esAjYxK.bat"
                                                                  23⤵
                                                                    PID:3744
                                                                    • C:\Windows\system32\w32tm.exe
                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                      24⤵
                                                                        PID:1596
                                                                      • C:\Program Files (x86)\Windows Portable Devices\dwm.exe
                                                                        "C:\Program Files (x86)\Windows Portable Devices\dwm.exe"
                                                                        24⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        • Modifies registry class
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:3508
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hC9SSnetfo.bat"
                                                                          25⤵
                                                                            PID:4308
                                                                            • C:\Windows\system32\w32tm.exe
                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                              26⤵
                                                                                PID:5088
                                                                              • C:\Program Files (x86)\Windows Portable Devices\dwm.exe
                                                                                "C:\Program Files (x86)\Windows Portable Devices\dwm.exe"
                                                                                26⤵
                                                                                • Checks computer location settings
                                                                                • Executes dropped EXE
                                                                                • Modifies registry class
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:220
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SQTB2Yz9K3.bat"
                                                                                  27⤵
                                                                                    PID:184
                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                      28⤵
                                                                                        PID:4388
                                                                                      • C:\Program Files (x86)\Windows Portable Devices\dwm.exe
                                                                                        "C:\Program Files (x86)\Windows Portable Devices\dwm.exe"
                                                                                        28⤵
                                                                                        • Checks computer location settings
                                                                                        • Executes dropped EXE
                                                                                        • Modifies registry class
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:4760
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1n8esAjYxK.bat"
                                                                                          29⤵
                                                                                            PID:1180
                                                                                            • C:\Windows\system32\w32tm.exe
                                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                              30⤵
                                                                                                PID:2500
                                                                                              • C:\Program Files (x86)\Windows Portable Devices\dwm.exe
                                                                                                "C:\Program Files (x86)\Windows Portable Devices\dwm.exe"
                                                                                                30⤵
                                                                                                • Checks computer location settings
                                                                                                • Executes dropped EXE
                                                                                                • Modifies registry class
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1684
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\f70LHM7oRz.bat"
                                                                                                  31⤵
                                                                                                    PID:3672
                                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                      32⤵
                                                                                                        PID:1056
                                              • C:\Windows\SysWOW64\reg.exe
                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                • Modifies registry key
                                                PID:5084
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\Default\PrintHood\RuntimeBroker.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1288
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default\PrintHood\RuntimeBroker.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5052
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Users\Default\PrintHood\RuntimeBroker.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2488
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\blockdriverintoRefdhcp\upfc.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4676
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\blockdriverintoRefdhcp\upfc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3580
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\blockdriverintoRefdhcp\upfc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1788
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Documents\cmd.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3000
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Users\Default\Documents\cmd.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1608
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Documents\cmd.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4244
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2108
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4476
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4964
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Libraries\fontdrvhost.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1504
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Public\Libraries\fontdrvhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2892
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Libraries\fontdrvhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1584
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Searches\Idle.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4816
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Admin\Searches\Idle.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2072
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Searches\Idle.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3948
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\en-US\upfc.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4956
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\en-US\upfc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1232
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Internet Explorer\en-US\upfc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:460
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\blockdriverintoRefdhcp\dllhost.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4872
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\blockdriverintoRefdhcp\dllhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4736
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\blockdriverintoRefdhcp\dllhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1888
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Common Files\Oracle\upfc.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3360
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Oracle\upfc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1980
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Common Files\Oracle\upfc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3592
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\services.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3740
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\services.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5088
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\services.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2332
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Java\RuntimeBroker.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3164
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Java\RuntimeBroker.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4508
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Java\RuntimeBroker.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3088
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Mail\fontdrvhost.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1112
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\fontdrvhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2924
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Mail\fontdrvhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1988
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Defender\fr-FR\smss.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4048
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\fr-FR\smss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:436
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Defender\fr-FR\smss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3828
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Program Files\Google\Chrome\Application\Idle.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:920
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\Idle.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4312
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files\Google\Chrome\Application\Idle.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3328
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Portable Devices\dwm.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1664
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\dwm.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1392
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Portable Devices\dwm.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1572
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2536
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2044
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3712

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dwm.exe.log

                                          Filesize

                                          1KB

                                          MD5

                                          baf55b95da4a601229647f25dad12878

                                          SHA1

                                          abc16954ebfd213733c4493fc1910164d825cac8

                                          SHA256

                                          ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                          SHA512

                                          24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                        • C:\Users\Admin\AppData\Local\Temp\1n8esAjYxK.bat

                                          Filesize

                                          220B

                                          MD5

                                          294cc8b9eb2a0d605b37563295425b67

                                          SHA1

                                          e246e512ae10a1d83fac099756cc2e6b9c2643c1

                                          SHA256

                                          7200872d2b23c450b2dc3f5f36c14c2923beafd23cf6d456864f66534c42c255

                                          SHA512

                                          27f633545f205bfc6e2809854442324b0b8818526266b4b4014172f975698019899a847c0260492a540f6868b7086bb4a82a65bca9937785964a44b4ed63a47c

                                        • C:\Users\Admin\AppData\Local\Temp\4oJokgKWVw.bat

                                          Filesize

                                          220B

                                          MD5

                                          2ea6c150522453fcd6db99f6e78987be

                                          SHA1

                                          dbe4276a7b7cd6dd35e31a3eb5cf147ca5dddf7c

                                          SHA256

                                          6df95fea9d14f21a9164d89993e9c8cfe3e9981dbcc19edf65ac0cd0a1f23cce

                                          SHA512

                                          8bdfed76925b26039edb70d444e36d68945e3d25b1e3e9270ef6fcd48141e01ee8a942f6d059c553e4e355b4a6ba342fd7c6776c8b431199f948755b78544707

                                        • C:\Users\Admin\AppData\Local\Temp\AXFqcUy7ES.bat

                                          Filesize

                                          220B

                                          MD5

                                          cd21becbaad7d9bca9e742bdd8e0ebfd

                                          SHA1

                                          51ceb4db282b123807c77f9bf3bd60e002133342

                                          SHA256

                                          8d7a78f0f6432604b996dce0aa715c8613eceb8bbf5162cb24213ded7df96731

                                          SHA512

                                          bf54825c376189141d271fe306c4f19766cc61b94c2e4a799be7d6bc85440eae16706c3ffbf0a82b7c206262645e66a8fed5d77435ba51e7e1c9423b47bd79d5

                                        • C:\Users\Admin\AppData\Local\Temp\BikqvEHWfW.bat

                                          Filesize

                                          220B

                                          MD5

                                          54f61bf6d28ad4831da4fa804a985c9e

                                          SHA1

                                          d8b1d53bf9545e538e9f20a2024814f6a657b4b1

                                          SHA256

                                          103fad40fa7b4737f5285294331638a2720dfebf49fc31c7a5dc5a534aed67f2

                                          SHA512

                                          81790ffbf1c151b228689d53134a96b4a37138077a067f4b0261500e28497eed48717e17d38aefd3a72e432a25dc58584346059bd581f45929931ed1d6edb079

                                        • C:\Users\Admin\AppData\Local\Temp\EOJxze5tr1.bat

                                          Filesize

                                          220B

                                          MD5

                                          7f5dee39e073c3001a150cc8309be516

                                          SHA1

                                          a64cea5e7f3eb95c7b5da3e09cd86aed30aaba52

                                          SHA256

                                          934c563ded0ad63ed0a8a87948b00d7e2d3084828390190e5fda393d2095e17b

                                          SHA512

                                          8af816bde3e31b3ee741267b3f1f355396d1f85573db47348f414c48ae8ddcaaabb34a8a226185dc25cc40668c502690f982b3cb91c4e5278eb415f079974a59

                                        • C:\Users\Admin\AppData\Local\Temp\FaowIOOII5.bat

                                          Filesize

                                          220B

                                          MD5

                                          55705c92078332b912b4c6ed48509341

                                          SHA1

                                          372a182b4cea0424266441680f998d07340d67e2

                                          SHA256

                                          321968efa94f290ae906fb86d66ac19b37044bc88513e18450001dd7394cb7b5

                                          SHA512

                                          4d330f572707be2b9cf7a2cff985893097ec9658746b02f29b00ca6d622464051f240cff7186401f41e03b36f005f021a7631113c7337a706ca090c22debb6c1

                                        • C:\Users\Admin\AppData\Local\Temp\LfRsrCSxKQ.bat

                                          Filesize

                                          220B

                                          MD5

                                          e5ab9b5ca52585e1a1af844a269ed367

                                          SHA1

                                          84a7df5d061a1116e71b3143cc15f9c42fd4341f

                                          SHA256

                                          c5b29a99f96e6e2ad49295c59c42946094d89c8d35b4197af6ce7a54bdda5a6a

                                          SHA512

                                          3ea7bcdb9f901938570cd52276c2cc2371267d1181fcb1ebe7b097bf020393dac246baec15aef420be0cca3b1db2f96883960416cb43587a8aeaed2f47c98e4b

                                        • C:\Users\Admin\AppData\Local\Temp\SQTB2Yz9K3.bat

                                          Filesize

                                          220B

                                          MD5

                                          2664a0f3c883f29667f2d00c339caf1a

                                          SHA1

                                          8f47cdfc1f486855a011da8072b18e9383c5ce00

                                          SHA256

                                          eda3e41c36f07789e3b1c5f2f1e29e4b3b5637673fb7d7f385ce40e815634c9c

                                          SHA512

                                          af42d1d19b68b68802a1a6087e0dbf14195e4ea42a7fed5e5741c789ce3cb28cda03ac97c0a5859ec23866f8e2639dec9f0631610d6bbc463ddf71a7208b1c8b

                                        • C:\Users\Admin\AppData\Local\Temp\ZDYK5nApHO.bat

                                          Filesize

                                          220B

                                          MD5

                                          748036dd8020d8ea5f7d04feb7ed3d67

                                          SHA1

                                          8f7e9bc6d5ace40d682fc5c3b4aeca58cc8f9c65

                                          SHA256

                                          29444c62d9ac5bc948f2b3d1997eaceec549312ee97e7b764be1743be85f07c6

                                          SHA512

                                          5475e60d2e7966e29e8da6c6bcb6c61146bebf420838b579a64ae89545af0088f4d53b327e6762c6f24c7a6d89ea5275581321e5c855fdb3c7ed2f16225159e8

                                        • C:\Users\Admin\AppData\Local\Temp\f70LHM7oRz.bat

                                          Filesize

                                          220B

                                          MD5

                                          50d6b8d62c5800faf5d21fd920f76ad4

                                          SHA1

                                          dad8cff430d48e068f15b74c5dc5c4d9a3e14ea8

                                          SHA256

                                          5cf7a51562840385f90d94b9e78aaec36c91303b6aa771cadabf86a1c44e66ec

                                          SHA512

                                          8e5b9134fc73726df07c4cad162d19bb650c6d59cfe57bf969196df43d56628982124c157ff5fb91ba758bdb488551a290d54a25d95838720a733af1defb1ccf

                                        • C:\Users\Admin\AppData\Local\Temp\hC9SSnetfo.bat

                                          Filesize

                                          220B

                                          MD5

                                          4276cb88035f1762eeb41205c1e0f349

                                          SHA1

                                          198a25bd80bfcc76bb209595513607a333eea660

                                          SHA256

                                          e3be2b96087a7de17c95796e38793ef6fdadc8c8134c25421f8660aa14cacdef

                                          SHA512

                                          43d0cf2adc1bc6080bdf90327a18ac7072817607202e8ea8054eb529a9f56dcfdc24df7e34209f426e936df60eb17ac8e1ccfb44e49fb743ab3c6d253ce0fd07

                                        • C:\Users\Admin\AppData\Local\Temp\or7X1gMNi7.bat

                                          Filesize

                                          220B

                                          MD5

                                          1e74fd9c2d836ec2b6f9414c3427e40c

                                          SHA1

                                          faf7b1572fb7bb1f87ffeee05f2243ab7e528e99

                                          SHA256

                                          7e7cde174ede62fa234de399c0b1094b87380d8d0f52dbe938c1295cd50a6228

                                          SHA512

                                          22c02902062d77f20994d1422268218c9178573260399a672c849ad4597f9a019be7375fd6b631506acdd89cbe9cfb9f84946c30216bcef1d39dbf6f75443fbc

                                        • C:\Users\Admin\AppData\Local\Temp\syea0WjfTx.bat

                                          Filesize

                                          220B

                                          MD5

                                          fa1da09d3110e7950851268cb0ce2297

                                          SHA1

                                          fe8a15111f9b7562aa9d2fb4b85265c26dfacca2

                                          SHA256

                                          39119999fa3e2caa673412e4894a799d60a912265ad41f72224c1054c7bcea96

                                          SHA512

                                          b609d9a503162baac7c48449d18ac6e0147ef6eafeafcfb73f2064e526c637cf5913180c271b7f6eef14f2a32641b438d9f88adb5175ce797c47fe1c78a8320e

                                        • C:\blockdriverintoRefdhcp\IJdp5Y1jjSlcQsS9.bat

                                          Filesize

                                          163B

                                          MD5

                                          d238a0469d580df22f1581e8f0ce7b40

                                          SHA1

                                          b0ce8e65f7a64ec9d103f4b6eb0c2d3e9acbfedf

                                          SHA256

                                          d7b12013be33200d7a4c296f969e3ba2b77ba4f36aecb527fadfab116f9b1106

                                          SHA512

                                          0c19b5923ed41c83f61315fa9e72337cb16bccc4123838d27ac22a51660413fd8b2cf667e1f52cdeda9d45ef0144d6e25c02bc4d6ba9100deadbc4b6a6786596

                                        • C:\blockdriverintoRefdhcp\componentMonitornet.exe

                                          Filesize

                                          827KB

                                          MD5

                                          d839c7258cac4c0c3523ba7e0e0e9ba2

                                          SHA1

                                          78741a8c38f20cf7ea60f4cccaef9cef2266aa24

                                          SHA256

                                          e6f5ab7719b96b1b7e01433debb22d0f399d93839935fce599ea44f30487f6b2

                                          SHA512

                                          826e6d76712477862975dbafa6755d7538b28bff742bc1c918898a6efac152d209e732b381cdddef819df27a6aa9e4ed882b969dec2b8c40517803ecf91cd14f

                                        • C:\blockdriverintoRefdhcp\zjUQC6Kcs7ptRMsTAo49SRrfh.vbe

                                          Filesize

                                          215B

                                          MD5

                                          ee3c9a512853fd0790091acea86e5345

                                          SHA1

                                          6f88d7686903cec957dfb5ab3e706d7745ebecdf

                                          SHA256

                                          5457d4c6ab53c891a0a491d709bbe1642f93814804fbc5c91a825169fc80b6a3

                                          SHA512

                                          c114b445d1efa5f69d2bc5817dd48fe1502066c64291bcca3b06f38cb98dc6b36cba8ef9a2c4aa3ebb4de030545423cd46134b0707130e3df3c1d9ed32cced0d

                                        • memory/4056-13-0x0000000000670000-0x0000000000746000-memory.dmp

                                          Filesize

                                          856KB

                                        • memory/4056-12-0x00007FF8B56F3000-0x00007FF8B56F5000-memory.dmp

                                          Filesize

                                          8KB