Analysis

  • max time kernel
    63s
  • max time network
    59s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-02-2025 08:27

General

  • Target

    FatalityCrack.rar

  • Size

    5.2MB

  • MD5

    b77dc498ed6f44f61ece97fdb80111ce

  • SHA1

    3bb9c1624119a593e26011af95550879318b5ca0

  • SHA256

    691fc2c5c9b9effa163ffbd49bc9a8be1df6b0e6f8a792bedd4e418da3124d84

  • SHA512

    d6eb30d15ee16a48778ec7cabd43b2a64131d1d5227766effab7b4df2b4b6049be0d296ba10ba6e5ff62568b25e4720f6f01965ceef545141711102759c03283

  • SSDEEP

    98304:xi6h7ncSYv4+CSBI+PGfTh/MrOSoegHy4ror0Low9q8PQk/9sZbSEkTYQ49iY/e:oOnct9C8IIqThqOsQy4krNw9q8bAWTYc

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 54 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 9 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 54 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\FatalityCrack.rar"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Users\Admin\AppData\Local\Temp\7zO44B0E2C7\Fatality.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO44B0E2C7\Fatality.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Users\Admin\AppData\Local\Temp\Fatality2.exe
        "C:\Users\Admin\AppData\Local\Temp\Fatality2.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3120
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\comSavesCommon\sc70IAxKPvTolc.vbe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4764
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\comSavesCommon\0DO98.bat" "
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:104
            • C:\comSavesCommon\providerCrt.exe
              "C:\comSavesCommon\providerCrt.exe"
              6⤵
              • UAC bypass
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:3384
              • C:\Windows\ServiceProfiles\LocalService\Links\conhost.exe
                "C:\Windows\ServiceProfiles\LocalService\Links\conhost.exe"
                7⤵
                • UAC bypass
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:2780
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fbba92ba-9f31-4e3f-8da0-7c3a4b0ec633.vbs"
                  8⤵
                    PID:4912
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\94b76820-85b0-4e58-9f81-484859f1760c.vbs"
                    8⤵
                      PID:1352
          • C:\Users\Admin\AppData\Local\Temp\fatality.exe
            "C:\Users\Admin\AppData\Local\Temp\fatality.exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1176
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\VisualElements\cmd.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4220
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\VisualElements\cmd.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1732
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\VisualElements\cmd.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1060
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Mail\lsass.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:868
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:428
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Mail\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4536
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\comSavesCommon\csrss.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1612
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\comSavesCommon\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4088
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\comSavesCommon\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1532
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2820
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:540
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4964
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 13 /tr "'C:\comSavesCommon\StartMenuExperienceHost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2492
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\comSavesCommon\StartMenuExperienceHost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4540
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 7 /tr "'C:\comSavesCommon\StartMenuExperienceHost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3252
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\dllhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4792
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2480
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3268
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\comSavesCommon\conhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2796
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\comSavesCommon\conhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1892
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\comSavesCommon\conhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3184
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\comSavesCommon\csrss.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4548
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\comSavesCommon\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4996
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\comSavesCommon\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1116
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "7zFM7" /sc MINUTE /mo 6 /tr "'C:\comSavesCommon\7zFM.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4908
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "7zFM" /sc ONLOGON /tr "'C:\comSavesCommon\7zFM.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2072
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "7zFM7" /sc MINUTE /mo 14 /tr "'C:\comSavesCommon\7zFM.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3528
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1904
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2284
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4232
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Windows\ServiceProfiles\LocalService\Links\conhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3736
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\LocalService\Links\conhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3500
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Windows\ServiceProfiles\LocalService\Links\conhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4324
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\dllhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3104
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3144
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:828
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Windows\PolicyDefinitions\it-IT\spoolsv.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3172
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\it-IT\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:124
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Windows\PolicyDefinitions\it-IT\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1852
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Defender\RuntimeBroker.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1808
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3988
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Defender\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3824
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:5076
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4980
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:796
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\dllhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4756
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:800
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2452
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\fontdrvhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3864
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\fontdrvhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2432
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\fontdrvhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:656
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\cmd.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1888
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\cmd.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4660
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\cmd.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2296
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:3092
        • C:\Users\Admin\Desktop\New folder\Fatality.exe
          "C:\Users\Admin\Desktop\New folder\Fatality.exe"
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2408
          • C:\Users\Admin\AppData\Local\Temp\Fatality2.exe
            "C:\Users\Admin\AppData\Local\Temp\Fatality2.exe"
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1064
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\comSavesCommon\sc70IAxKPvTolc.vbe"
              3⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1732
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\comSavesCommon\0DO98.bat" "
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1244
                • C:\comSavesCommon\providerCrt.exe
                  "C:\comSavesCommon\providerCrt.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1484
          • C:\Users\Admin\AppData\Local\Temp\fatality.exe
            "C:\Users\Admin\AppData\Local\Temp\fatality.exe"
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:904
        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4616

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Fatality.exe.log

          Filesize

          1KB

          MD5

          529d88befdcb9c82af230a03da30f9d2

          SHA1

          faafd7f649d768355060daedcef19d0c46bfffbb

          SHA256

          d4467a14b864014afce828690ec3f85f09cbf661796515c7bcaa9aefac5c0eaa

          SHA512

          5ca250ab149ce6e88e4e68e95c6bfcf8c43db9cd214325f63b7e520fabc64dd8e6ba75d20108af8308a16956ec131a300d5a99e7221c49daa4aa13755e8f13a1

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\providerCrt.exe.log

          Filesize

          1KB

          MD5

          311f1926e60b4f85bf8140299ca70235

          SHA1

          9b700a28d63b5dae143da22bf642c67f3bb0af49

          SHA256

          aaa667e50ce82f1cc798b5aacf93f14ef83632c20bea6655d66f631ce6f0c70b

          SHA512

          e58bcdcd64b52b68cf88c7e92932665a196a35b5a0b3c483179b69389553669607e443c33ffb40ec02b506ee353522e973b58292215697fc430226e79dcb7f24

        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

          Filesize

          10KB

          MD5

          96329c73cc49cd960e2485210d01c4d2

          SHA1

          a496b98ad2f2bbf26687b5b7794a26aa4470148e

          SHA256

          4c159cab6c9ef5ff39e6141b0ccb5b8c6251a3d637520609dfbdd852fa94d466

          SHA512

          e98736a879cad24c693d6c5939654b2fd25bf9d348f738668624214f22d541a9b781c967201ab2d43cbac9207946824a0299d482485f4b63c48d5d2a839e5baf

        • C:\Users\Admin\AppData\Local\Temp\7zO44B0E2C7\Fatality.exe

          Filesize

          4.0MB

          MD5

          fbd12d4ed9c24c092a1690cc37724957

          SHA1

          9d8709497378bb43d7d77d74b4919a36c01c895a

          SHA256

          27e56c30c96f880010fb2ec6151ca1176c7292541050ce3f2158b38e82f9f46c

          SHA512

          829c07f37b99c563065ce84b1a0d721ac93e1b2092d358c297a001c163cd278f43d4f21661dbe7001ecba9841079ba66b57229041dc0698a9a28975ca7c5c2a0

        • C:\Users\Admin\AppData\Local\Temp\94b76820-85b0-4e58-9f81-484859f1760c.vbs

          Filesize

          509B

          MD5

          c7854a0e93ae572dc995e78663129bc8

          SHA1

          b155b80093149e0d546a33592e5ed5c8484edc3b

          SHA256

          ff245a9638f04836f21ed70383fc0616a6c2e9ab4a41b72ba17cdb04f496ef65

          SHA512

          211c86becfb32124a1c6bdf8a38e60ee040067cce90a7d4367670ca4a78ee71835764b3d33eab9bc712e1ca361788b4aa36a280e1fd48dfc0b7daaece9b1de1c

        • C:\Users\Admin\AppData\Local\Temp\Fatality2.exe

          Filesize

          3.3MB

          MD5

          d7a497c51a219967de0636c63d0b6ff7

          SHA1

          b2a027f0139135dca65c417ee9d1f5963c965825

          SHA256

          3f7dbeb177934d53205b93a27b9f4262fe0f46aaf090326cb8e2069d90d0414c

          SHA512

          728a0ce0e6e2e60f3bc69786f7d69939b171279d07aafcc37720156954bd96d707a035bffe0497463bb0483c82a03c57c5b33624a3114526d12dd43fa509c921

        • C:\Users\Admin\AppData\Local\Temp\fatality.exe

          Filesize

          2.0MB

          MD5

          b5ae62edbf81a0dec30fedcc6d136245

          SHA1

          9f89cca56f20cb73503e068f5bb115fdda0cf272

          SHA256

          5cd7137393dddb5cd41a55429871f443dcf6c2791eeaaade4fdb43f7a07c8865

          SHA512

          3e525757ca541897e3766f73e53f21ac4ba1147ee33cc5df2117131808de8e6a3c576d8799e22dc3c76afe163102cc8517a3834388c1f06365e892a389166cc7

        • C:\Users\Admin\AppData\Local\Temp\fbba92ba-9f31-4e3f-8da0-7c3a4b0ec633.vbs

          Filesize

          733B

          MD5

          efda1224523836ce1f1888a545cfca57

          SHA1

          36dbaaa8fcfcfee9339afcb3fbee057d81943d34

          SHA256

          b30e3509c62cebec55204088c60cffdc09926a99e9419cef4ce71c066575d6d3

          SHA512

          2d114a7ad6eb704cefaaf1faf14e9236296ed3c010f09151845c2828b2e8c457ae7d87df69a30d40be73df7f88ca12b29abc2451f4ec4fac70045c049149eaa3

        • C:\comSavesCommon\0DO98.bat

          Filesize

          35B

          MD5

          287a1d2eb08c19f2c25d7f2ae9f2514c

          SHA1

          02848644d030ea07622280f44c4de07a995ee18e

          SHA256

          a1c6a60f1b7ddb527a30dad1c3073916f7068a2fdbb2b15598f3905b42cbb52a

          SHA512

          e5a31793fb0f147fd10344caf7527a1a827a5aaab9b8f12c18d6fb067312b43346b4f82f099450158a5aa1552cfbe9dc811d801861fe4c8f61e0c493f32f428b

        • C:\comSavesCommon\providerCrt.exe

          Filesize

          3.0MB

          MD5

          d6ad419407e01490a6423c86dc133a2b

          SHA1

          3f281e19055eb89000bccdffe11243663134c762

          SHA256

          9055ac76247c7b28a3f66bef41ec65e280b5a729862bc36789fa41e5ae7c53ce

          SHA512

          6da8a0e699a922f9e7f335467540f92fadc79ea7bd840ebc2d86e9be3909421c9c494da7df5c72ad5ef2a818f718ca67886de7b45da93e6cb050ebefb0a6119d

        • C:\comSavesCommon\sc70IAxKPvTolc.vbe

          Filesize

          197B

          MD5

          b0e77cae01fcf490ba345155c34c462d

          SHA1

          8b1a27868b122c54db4b55a1f9bb11ae1f9a8d9b

          SHA256

          aabe1b22990d934e5723fdd4199bb2a22d5b58c25151698f66a83646e86fb278

          SHA512

          b1f8519895d6c5c92acdf124c82530debedaa9c0f673b92babc92ceceb4f8c579f8060f093bbe6c20bbc6358ce29735dcca5d0338a9deafe508a43b160b25363

        • memory/2780-121-0x000000001BD00000-0x000000001BD56000-memory.dmp

          Filesize

          344KB

        • memory/3384-57-0x0000000002760000-0x0000000002768000-memory.dmp

          Filesize

          32KB

        • memory/3384-63-0x000000001B260000-0x000000001B268000-memory.dmp

          Filesize

          32KB

        • memory/3384-49-0x0000000000E30000-0x0000000000E4C000-memory.dmp

          Filesize

          112KB

        • memory/3384-50-0x000000001B070000-0x000000001B0C0000-memory.dmp

          Filesize

          320KB

        • memory/3384-52-0x0000000002710000-0x0000000002726000-memory.dmp

          Filesize

          88KB

        • memory/3384-53-0x0000000002730000-0x000000000273C000-memory.dmp

          Filesize

          48KB

        • memory/3384-51-0x0000000002700000-0x0000000002708000-memory.dmp

          Filesize

          32KB

        • memory/3384-54-0x0000000002740000-0x000000000274A000-memory.dmp

          Filesize

          40KB

        • memory/3384-55-0x000000001B0C0000-0x000000001B116000-memory.dmp

          Filesize

          344KB

        • memory/3384-56-0x0000000002750000-0x000000000275C000-memory.dmp

          Filesize

          48KB

        • memory/3384-47-0x0000000000C70000-0x0000000000C7E000-memory.dmp

          Filesize

          56KB

        • memory/3384-58-0x0000000002770000-0x000000000277C000-memory.dmp

          Filesize

          48KB

        • memory/3384-59-0x0000000002780000-0x0000000002788000-memory.dmp

          Filesize

          32KB

        • memory/3384-60-0x000000001B110000-0x000000001B122000-memory.dmp

          Filesize

          72KB

        • memory/3384-61-0x000000001BE20000-0x000000001C348000-memory.dmp

          Filesize

          5.2MB

        • memory/3384-62-0x000000001B250000-0x000000001B25C000-memory.dmp

          Filesize

          48KB

        • memory/3384-64-0x000000001B270000-0x000000001B27C000-memory.dmp

          Filesize

          48KB

        • memory/3384-48-0x0000000000E20000-0x0000000000E28000-memory.dmp

          Filesize

          32KB

        • memory/3384-65-0x000000001B280000-0x000000001B28C000-memory.dmp

          Filesize

          48KB

        • memory/3384-66-0x000000001B290000-0x000000001B298000-memory.dmp

          Filesize

          32KB

        • memory/3384-67-0x000000001B2A0000-0x000000001B2AC000-memory.dmp

          Filesize

          48KB

        • memory/3384-68-0x000000001B2B0000-0x000000001B2BA000-memory.dmp

          Filesize

          40KB

        • memory/3384-69-0x000000001B2C0000-0x000000001B2CE000-memory.dmp

          Filesize

          56KB

        • memory/3384-72-0x000000001BCC0000-0x000000001BCCA000-memory.dmp

          Filesize

          40KB

        • memory/3384-73-0x000000001BCD0000-0x000000001BCDC000-memory.dmp

          Filesize

          48KB

        • memory/3384-71-0x000000001BCB0000-0x000000001BCB8000-memory.dmp

          Filesize

          32KB

        • memory/3384-70-0x000000001B2D0000-0x000000001B2DE000-memory.dmp

          Filesize

          56KB

        • memory/3384-46-0x0000000000C50000-0x0000000000C5E000-memory.dmp

          Filesize

          56KB

        • memory/3384-45-0x0000000000120000-0x000000000042A000-memory.dmp

          Filesize

          3.0MB

        • memory/4092-39-0x00007FFF55630000-0x00007FFF560F2000-memory.dmp

          Filesize

          10.8MB

        • memory/4092-14-0x00007FFF55630000-0x00007FFF560F2000-memory.dmp

          Filesize

          10.8MB

        • memory/4092-13-0x00000000009A0000-0x0000000000DA0000-memory.dmp

          Filesize

          4.0MB

        • memory/4092-12-0x00007FFF55633000-0x00007FFF55635000-memory.dmp

          Filesize

          8KB