Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2025 15:46
Behavioral task
behavioral1
Sample
cf40b5e2332d76b97a1a1a18f89b68ef.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf40b5e2332d76b97a1a1a18f89b68ef.exe
Resource
win10v2004-20250129-en
General
-
Target
cf40b5e2332d76b97a1a1a18f89b68ef.exe
-
Size
769KB
-
MD5
cf40b5e2332d76b97a1a1a18f89b68ef
-
SHA1
2c352c7e4521570c3cd7c99a35b715feed866f03
-
SHA256
e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272
-
SHA512
27ac673faa2306c572a5600195c08c875c47892df513547cfba91674e37fdd0876c2344662c81ecf00a0b3bbe515e07696b248f64e1221bec4398b3b1cff7f9a
-
SSDEEP
12288:CvTnXW/cYwVIB/6f/iJJMA+opW3Ari4VVyZC0+1ctHNt8KF4AXDYZ6:CvTn2whf/MJMA+o3iE0n3a6
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Adobe\\winlogon.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Adobe\\winlogon.exe\", \"C:\\Windows\\InputMethod\\CHT\\csrss.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Adobe\\winlogon.exe\", \"C:\\Windows\\InputMethod\\CHT\\csrss.exe\", \"C:\\Program Files (x86)\\Google\\Update\\Download\\cf40b5e2332d76b97a1a1a18f89b68ef.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Adobe\\winlogon.exe\", \"C:\\Windows\\InputMethod\\CHT\\csrss.exe\", \"C:\\Program Files (x86)\\Google\\Update\\Download\\cf40b5e2332d76b97a1a1a18f89b68ef.exe\", \"C:\\Recovery\\WindowsRE\\sppsvc.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Adobe\\winlogon.exe\", \"C:\\Windows\\InputMethod\\CHT\\csrss.exe\", \"C:\\Program Files (x86)\\Google\\Update\\Download\\cf40b5e2332d76b97a1a1a18f89b68ef.exe\", \"C:\\Recovery\\WindowsRE\\sppsvc.exe\", \"C:\\Windows\\PolicyDefinitions\\it-IT\\MusNotification.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Adobe\\winlogon.exe\", \"C:\\Windows\\InputMethod\\CHT\\csrss.exe\", \"C:\\Program Files (x86)\\Google\\Update\\Download\\cf40b5e2332d76b97a1a1a18f89b68ef.exe\", \"C:\\Recovery\\WindowsRE\\sppsvc.exe\", \"C:\\Windows\\PolicyDefinitions\\it-IT\\MusNotification.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\cf40b5e2332d76b97a1a1a18f89b68ef.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4936 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4956 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4048 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 928 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5080 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3608 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3576 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1096 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 536 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 652 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1456 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 956 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1880 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 380 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4660 4848 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4556 4848 schtasks.exe 86 -
DCRat payload 2 IoCs
resource yara_rule behavioral2/memory/676-1-0x0000000000720000-0x00000000007E6000-memory.dmp family_dcrat_v2 behavioral2/files/0x0007000000023cad-23.dat family_dcrat_v2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation cf40b5e2332d76b97a1a1a18f89b68ef.exe -
Executes dropped EXE 1 IoCs
pid Process 1996 sppsvc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Recovery\\WindowsRE\\sppsvc.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Recovery\\WindowsRE\\sppsvc.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MusNotification = "\"C:\\Windows\\PolicyDefinitions\\it-IT\\MusNotification.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cf40b5e2332d76b97a1a1a18f89b68ef = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\cf40b5e2332d76b97a1a1a18f89b68ef.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cf40b5e2332d76b97a1a1a18f89b68ef = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\cf40b5e2332d76b97a1a1a18f89b68ef.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cf40b5e2332d76b97a1a1a18f89b68ef = "\"C:\\Program Files (x86)\\Google\\Update\\Download\\cf40b5e2332d76b97a1a1a18f89b68ef.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files (x86)\\Adobe\\winlogon.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\InputMethod\\CHT\\csrss.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\InputMethod\\CHT\\csrss.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cf40b5e2332d76b97a1a1a18f89b68ef = "\"C:\\Program Files (x86)\\Google\\Update\\Download\\cf40b5e2332d76b97a1a1a18f89b68ef.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MusNotification = "\"C:\\Windows\\PolicyDefinitions\\it-IT\\MusNotification.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files (x86)\\Adobe\\winlogon.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCF701790E39C6404B9E3082BF613F6E8E.TMP csc.exe File created \??\c:\Windows\System32\lxswus.exe csc.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Update\Download\cf40b5e2332d76b97a1a1a18f89b68ef.exe cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Program Files (x86)\Google\Update\Download\6fa1fff71560ec cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Program Files (x86)\Adobe\winlogon.exe cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Program Files (x86)\Adobe\cc11b995f2a76d cf40b5e2332d76b97a1a1a18f89b68ef.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\PolicyDefinitions\it-IT\MusNotification.exe cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Windows\PolicyDefinitions\it-IT\aa97147c4c782d cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Windows\OCR\en-us\RuntimeBroker.exe cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Windows\InputMethod\CHT\csrss.exe cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Windows\InputMethod\CHT\886983d96e3d3e cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Windows\PolicyDefinitions\it-IT\MusNotification.exe cf40b5e2332d76b97a1a1a18f89b68ef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings cf40b5e2332d76b97a1a1a18f89b68ef.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3608 schtasks.exe 2240 schtasks.exe 956 schtasks.exe 1456 schtasks.exe 1640 schtasks.exe 4936 schtasks.exe 4048 schtasks.exe 5080 schtasks.exe 1096 schtasks.exe 652 schtasks.exe 4556 schtasks.exe 928 schtasks.exe 3576 schtasks.exe 536 schtasks.exe 1880 schtasks.exe 380 schtasks.exe 4956 schtasks.exe 4660 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1996 sppsvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe Token: SeDebugPrivilege 1996 sppsvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 676 wrote to memory of 1392 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 90 PID 676 wrote to memory of 1392 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 90 PID 1392 wrote to memory of 3472 1392 csc.exe 93 PID 1392 wrote to memory of 3472 1392 csc.exe 93 PID 676 wrote to memory of 1776 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 110 PID 676 wrote to memory of 1776 676 cf40b5e2332d76b97a1a1a18f89b68ef.exe 110 PID 1776 wrote to memory of 1936 1776 cmd.exe 112 PID 1776 wrote to memory of 1936 1776 cmd.exe 112 PID 1776 wrote to memory of 2004 1776 cmd.exe 113 PID 1776 wrote to memory of 2004 1776 cmd.exe 113 PID 1776 wrote to memory of 1996 1776 cmd.exe 121 PID 1776 wrote to memory of 1996 1776 cmd.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf40b5e2332d76b97a1a1a18f89b68ef.exe"C:\Users\Admin\AppData\Local\Temp\cf40b5e2332d76b97a1a1a18f89b68ef.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\re5kryin\re5kryin.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD021.tmp" "c:\Windows\System32\CSCF701790E39C6404B9E3082BF613F6E8E.TMP"3⤵PID:3472
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6E3nLFscIq.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1936
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2004
-
-
C:\Recovery\WindowsRE\sppsvc.exe"C:\Recovery\WindowsRE\sppsvc.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Adobe\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Adobe\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\InputMethod\CHT\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\InputMethod\CHT\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\InputMethod\CHT\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cf40b5e2332d76b97a1a1a18f89b68efc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Google\Update\Download\cf40b5e2332d76b97a1a1a18f89b68ef.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cf40b5e2332d76b97a1a1a18f89b68ef" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\Download\cf40b5e2332d76b97a1a1a18f89b68ef.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cf40b5e2332d76b97a1a1a18f89b68efc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\Update\Download\cf40b5e2332d76b97a1a1a18f89b68ef.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 10 /tr "'C:\Windows\PolicyDefinitions\it-IT\MusNotification.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\it-IT\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 9 /tr "'C:\Windows\PolicyDefinitions\it-IT\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cf40b5e2332d76b97a1a1a18f89b68efc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Local\Temp\cf40b5e2332d76b97a1a1a18f89b68ef.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cf40b5e2332d76b97a1a1a18f89b68ef" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\cf40b5e2332d76b97a1a1a18f89b68ef.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cf40b5e2332d76b97a1a1a18f89b68efc" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\Local\Temp\cf40b5e2332d76b97a1a1a18f89b68ef.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4556
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
769KB
MD5cf40b5e2332d76b97a1a1a18f89b68ef
SHA12c352c7e4521570c3cd7c99a35b715feed866f03
SHA256e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272
SHA51227ac673faa2306c572a5600195c08c875c47892df513547cfba91674e37fdd0876c2344662c81ecf00a0b3bbe515e07696b248f64e1221bec4398b3b1cff7f9a
-
Filesize
208B
MD5387b25cf7cfe8231ab4806fe8928b5c1
SHA178ef3b6361e912dee0e466c42563e06d55646ea1
SHA256b46461fda3732908c94e01d21d6f6b546022c8d27f3bee5c9cd74aa875e8f55f
SHA512634b41a33f4c5c9085619d55c9677487af636b26e52c766c597a44112b2738ed5fdc616fad8c19d8fa4d30c709033a4e136a5755bad8fcf3892b2f46cf7bc11f
-
Filesize
1KB
MD55f887ced70ba0357d0a5c5265c242fb4
SHA12fb72fae4950c4c762b2e3aaca5d5f707430879d
SHA25654672b47e5a0dcc26bcdbcf15cbb90e5e4b5b823424ed682991a202cd9083423
SHA512ce5a3d976c25c902b71cbc953a39a65ff79e4fb6bbe45a800cfc94c385cbcbd47f4b36c35444b59a34c92acb9323aae76cb551739d2050cb5e111e3f54954b5a
-
Filesize
373B
MD51c7cefe30e79920ae48af414a4808596
SHA10e7c33bb2c88cfd9ef5831bca07dbcc7c001085a
SHA256e55e1740bd5c6f87be4242753ce789ec2f73b4423578c27251aceb9bfeac3541
SHA512a7232b75ddd51226a7b45101f1a1092b6e6d9d3f6bcb1e268bf32483dec174fcf2f326710ca3b3e1b91b8f6ff99038bbcfe38507aae4c27a598e231e77f88954
-
Filesize
235B
MD55f022b2bcfddeee4bada43fedd1baa44
SHA19b16870375119fe43ef491ccb5e4dec019f5a920
SHA2568587d77eb9a41d0e4857b5233d8d1110be443d72e5579ae99261107d04a9be63
SHA512161e928c6053ef501e0c4e5979379cadb69eda47538e0a4137d83c96f1a2af741f1cc3f99c8f78c44fc45038b49cfa44b7df2d40e23c224165ac4eb913a70e11
-
Filesize
1KB
MD572f89171a1931b941e3fcc281bfc549e
SHA19648145810bb8b9ecef682a8215a08065723852e
SHA256b1858806d65859b1f0607bdb45b33cbc0745c496a45414b6833c94a5a792a938
SHA51204e9a596bc2354251ef44848eb1662658b053fd6065369c8ca46f6c597516738d57efafe9669fb9d20dbe4b957d6afa379fc48a06c252260419a82de72e4cf8a