Analysis
-
max time kernel
119s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-02-2025 11:35
Static task
static1
Behavioral task
behavioral1
Sample
b330a516dc2ed01776ad58b0dc970216.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b330a516dc2ed01776ad58b0dc970216.exe
Resource
win10v2004-20250129-en
General
-
Target
b330a516dc2ed01776ad58b0dc970216.exe
-
Size
1.6MB
-
MD5
b330a516dc2ed01776ad58b0dc970216
-
SHA1
78db141d31b8131aabd9ba1c9144a33c8cd6842b
-
SHA256
2b513177e1ebb418f3e4d2cd3947c0b248bdd064188538d00518118dd916aee2
-
SHA512
f25f66055176b4060b94ff3c765d54d6d7ee0186b70001205c2e65696180a57b32de897df1664bad8611f81da0f3267b6daf9eea46a0c68c4746c54a56999209
-
SSDEEP
24576:GlZi59u2GRCRXXdoOH0dMPg/riXqsLS29ryVYNN+GCiRtnATOD:GPfsDHwsg/riE29rC2+GJRVA
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Idle.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Windows\\Fonts\\lsm.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Windows\\Fonts\\lsm.exe\", \"C:\\Program Files (x86)\\Windows Media Player\\audiodg.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Windows\\Fonts\\lsm.exe\", \"C:\\Program Files (x86)\\Windows Media Player\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\wininit.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Windows\\Fonts\\lsm.exe\", \"C:\\Program Files (x86)\\Windows Media Player\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Users\\Admin\\Pictures\\dllhost.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Windows\\Fonts\\lsm.exe\", \"C:\\Program Files (x86)\\Windows Media Player\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Users\\Admin\\Pictures\\dllhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\b330a516dc2ed01776ad58b0dc970216.exe\"" b330a516dc2ed01776ad58b0dc970216.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 624 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1084 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 276 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2680 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3008 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2764 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2320 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 468 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1580 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1040 2692 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2260 2692 schtasks.exe 30 -
Executes dropped EXE 1 IoCs
pid Process 2452 audiodg.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files (x86)\\Windows Media Player\\audiodg.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files (x86)\\Windows Media Player\\audiodg.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\wininit.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Admin\\Pictures\\dllhost.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Admin\\Pictures\\dllhost.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files\\MSBuild\\Microsoft\\Idle.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files\\MSBuild\\Microsoft\\Idle.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\Fonts\\lsm.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b330a516dc2ed01776ad58b0dc970216 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\b330a516dc2ed01776ad58b0dc970216.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\Fonts\\lsm.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\wininit.exe\"" b330a516dc2ed01776ad58b0dc970216.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\b330a516dc2ed01776ad58b0dc970216 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\b330a516dc2ed01776ad58b0dc970216.exe\"" b330a516dc2ed01776ad58b0dc970216.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC55B16C27EFFF421984F8FBCE4B7FB8AF.TMP csc.exe File created \??\c:\Windows\System32\gxbog2.exe csc.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\audiodg.exe b330a516dc2ed01776ad58b0dc970216.exe File created C:\Program Files (x86)\Windows Media Player\42af1c969fbb7b b330a516dc2ed01776ad58b0dc970216.exe File created C:\Program Files\MSBuild\Microsoft\Idle.exe b330a516dc2ed01776ad58b0dc970216.exe File created C:\Program Files\MSBuild\Microsoft\6ccacd8608530f b330a516dc2ed01776ad58b0dc970216.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\lsm.exe b330a516dc2ed01776ad58b0dc970216.exe File created C:\Windows\Fonts\101b941d020240 b330a516dc2ed01776ad58b0dc970216.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2980 schtasks.exe 3008 schtasks.exe 2320 schtasks.exe 1580 schtasks.exe 2260 schtasks.exe 276 schtasks.exe 2700 schtasks.exe 1084 schtasks.exe 2680 schtasks.exe 2844 schtasks.exe 2608 schtasks.exe 624 schtasks.exe 2376 schtasks.exe 2872 schtasks.exe 2764 schtasks.exe 468 schtasks.exe 1040 schtasks.exe 2068 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2876 b330a516dc2ed01776ad58b0dc970216.exe 2452 audiodg.exe 2452 audiodg.exe 2452 audiodg.exe 2452 audiodg.exe 2452 audiodg.exe 2452 audiodg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2876 b330a516dc2ed01776ad58b0dc970216.exe Token: SeDebugPrivilege 2452 audiodg.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2876 wrote to memory of 592 2876 b330a516dc2ed01776ad58b0dc970216.exe 34 PID 2876 wrote to memory of 592 2876 b330a516dc2ed01776ad58b0dc970216.exe 34 PID 2876 wrote to memory of 592 2876 b330a516dc2ed01776ad58b0dc970216.exe 34 PID 592 wrote to memory of 580 592 csc.exe 36 PID 592 wrote to memory of 580 592 csc.exe 36 PID 592 wrote to memory of 580 592 csc.exe 36 PID 2876 wrote to memory of 2768 2876 b330a516dc2ed01776ad58b0dc970216.exe 52 PID 2876 wrote to memory of 2768 2876 b330a516dc2ed01776ad58b0dc970216.exe 52 PID 2876 wrote to memory of 2768 2876 b330a516dc2ed01776ad58b0dc970216.exe 52 PID 2768 wrote to memory of 2028 2768 cmd.exe 54 PID 2768 wrote to memory of 2028 2768 cmd.exe 54 PID 2768 wrote to memory of 2028 2768 cmd.exe 54 PID 2768 wrote to memory of 1168 2768 cmd.exe 55 PID 2768 wrote to memory of 1168 2768 cmd.exe 55 PID 2768 wrote to memory of 1168 2768 cmd.exe 55 PID 2768 wrote to memory of 2452 2768 cmd.exe 56 PID 2768 wrote to memory of 2452 2768 cmd.exe 56 PID 2768 wrote to memory of 2452 2768 cmd.exe 56 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b330a516dc2ed01776ad58b0dc970216.exe"C:\Users\Admin\AppData\Local\Temp\b330a516dc2ed01776ad58b0dc970216.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\e2snvw2o\e2snvw2o.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES756E.tmp" "c:\Windows\System32\CSC55B16C27EFFF421984F8FBCE4B7FB8AF.TMP"3⤵PID:580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ejRGfI2ABE.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2028
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1168
-
-
C:\Program Files (x86)\Windows Media Player\audiodg.exe"C:\Program Files (x86)\Windows Media Player\audiodg.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files\MSBuild\Microsoft\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Program Files\MSBuild\Microsoft\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Windows\Fonts\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\Fonts\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Windows\Fonts\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Media Player\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Media Player\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Pictures\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Admin\Pictures\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Pictures\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b330a516dc2ed01776ad58b0dc970216b" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\AppData\Local\Temp\b330a516dc2ed01776ad58b0dc970216.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b330a516dc2ed01776ad58b0dc970216" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\b330a516dc2ed01776ad58b0dc970216.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b330a516dc2ed01776ad58b0dc970216b" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\Temp\b330a516dc2ed01776ad58b0dc970216.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2260
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5b330a516dc2ed01776ad58b0dc970216
SHA178db141d31b8131aabd9ba1c9144a33c8cd6842b
SHA2562b513177e1ebb418f3e4d2cd3947c0b248bdd064188538d00518118dd916aee2
SHA512f25f66055176b4060b94ff3c765d54d6d7ee0186b70001205c2e65696180a57b32de897df1664bad8611f81da0f3267b6daf9eea46a0c68c4746c54a56999209
-
Filesize
1KB
MD57ad0813c37ceda07a7e8baaacee6ee60
SHA173a826927e776b043eb766fe9d6d13cd12b776f4
SHA256a9cdc9ae12f1247ce21d576e63d11642bce6d3e984cc4eebe5bdcf2a15922aee
SHA512adddde87b817cda2b8595bfccdf25bfec6645dc927bbf5cc635db8cacaedea1b0d4f8e85157892a958e2108149f53653a32961560aea806f53233d2d99ff8a71
-
Filesize
231B
MD5335dbd47332d2560c9b573373f13e725
SHA1be1965ae1815d91399bb8aa8d84792966b388b36
SHA25684410000989d762d8934d6e385b7f18c02c25c6f72d2714f352f678dda369040
SHA5121a5510a328a771fe9e851b264510a7d7c551892df618218aeac4c6df76cc4072503c69f21929f091dfaabd7f5c18782a2035db1cf324aa9c746506dd696a9e04
-
Filesize
375B
MD5cf6699df0dba00b34e526527b0214463
SHA139e035dc825566162f4de1e8072db55f3f434237
SHA256d2861a0ba2fd639c79646e0e825c86dd06a857a775528625789da2b6d93d17cc
SHA512fe2f87490edd4520ab91a2e8a0550dfdc00c04fd67633c974694ddf8c97460ae44dde33fb7546576706ae129cedb24742ddc769c0255cc63faf71b623ed97b41
-
Filesize
235B
MD5be6b6f26eca6505c9ba335a9ae0fa7e3
SHA172759e60c60586468c3e61ab82776649a87d8d69
SHA256b5b93ec9602ae19b16a98f018b198be0e3c3294288557d8544cca0569ba458fc
SHA512bbedb5d8fd0144d35f2563e781d4339ab6bdf013a245428345073910338814cbdb0e23050c41c1a6b618e0bca51dcae66197c6e19289b77c73a1f7a5fcfb913e
-
Filesize
1KB
MD5dbb2cd021b80875d9c777c705ef845c8
SHA13ed0cde3b4f4d8267c3cddd37dd4ede100b5ecce
SHA256a4d8c8c391bc1975510bdea24653db0f578d998dead4ce7f8a85eb8fbb3ec829
SHA512a8076e4d1b1641e189d2066050809ce0cce557e23c110fba77c2cfb7448b5915252b2e2f4d3443f708941277b947b951cfba6c191980a09b8c7710589c766c8e