Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2025 15:50
Behavioral task
behavioral1
Sample
cf40b5e2332d76b97a1a1a18f89b68ef.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf40b5e2332d76b97a1a1a18f89b68ef.exe
Resource
win10v2004-20241007-en
General
-
Target
cf40b5e2332d76b97a1a1a18f89b68ef.exe
-
Size
769KB
-
MD5
cf40b5e2332d76b97a1a1a18f89b68ef
-
SHA1
2c352c7e4521570c3cd7c99a35b715feed866f03
-
SHA256
e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272
-
SHA512
27ac673faa2306c572a5600195c08c875c47892df513547cfba91674e37fdd0876c2344662c81ecf00a0b3bbe515e07696b248f64e1221bec4398b3b1cff7f9a
-
SSDEEP
12288:CvTnXW/cYwVIB/6f/iJJMA+opW3Ari4VVyZC0+1ctHNt8KF4AXDYZ6:CvTn2whf/MJMA+o3iE0n3a6
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\sysmon.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\sysmon.exe\", \"C:\\Program Files\\Windows Security\\BrowserCore\\en-US\\SearchApp.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\sysmon.exe\", \"C:\\Program Files\\Windows Security\\BrowserCore\\en-US\\SearchApp.exe\", \"C:\\Windows\\security\\templates\\dwm.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\sysmon.exe\", \"C:\\Program Files\\Windows Security\\BrowserCore\\en-US\\SearchApp.exe\", \"C:\\Windows\\security\\templates\\dwm.exe\", \"C:\\Windows\\AppReadiness\\lsass.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\sysmon.exe\", \"C:\\Program Files\\Windows Security\\BrowserCore\\en-US\\SearchApp.exe\", \"C:\\Windows\\security\\templates\\dwm.exe\", \"C:\\Windows\\AppReadiness\\lsass.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\cf40b5e2332d76b97a1a1a18f89b68ef.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\taskhostw.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4428 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1944 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2588 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1436 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 348 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3544 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2468 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1484 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4544 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1004 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2648 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 112 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1984 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3636 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3672 4716 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 4716 schtasks.exe 82 -
DCRat payload 2 IoCs
resource yara_rule behavioral2/memory/3124-1-0x0000000000590000-0x0000000000656000-memory.dmp family_dcrat_v2 behavioral2/files/0x0007000000023c97-23.dat family_dcrat_v2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation cf40b5e2332d76b97a1a1a18f89b68ef.exe -
Executes dropped EXE 1 IoCs
pid Process 4000 SearchApp.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\AppReadiness\\lsass.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Recovery\\WindowsRE\\taskhostw.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\security\\templates\\dwm.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\sysmon.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Program Files\\Windows Security\\BrowserCore\\en-US\\SearchApp.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Program Files\\Windows Security\\BrowserCore\\en-US\\SearchApp.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\security\\templates\\dwm.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\AppReadiness\\lsass.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cf40b5e2332d76b97a1a1a18f89b68ef = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\cf40b5e2332d76b97a1a1a18f89b68ef.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Recovery\\WindowsRE\\taskhostw.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\sysmon.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cf40b5e2332d76b97a1a1a18f89b68ef = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\cf40b5e2332d76b97a1a1a18f89b68ef.exe\"" cf40b5e2332d76b97a1a1a18f89b68ef.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC140186C38B3B4621B3BCA69C57DB79C4.TMP csc.exe File created \??\c:\Windows\System32\enb1sa.exe csc.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Windows Security\BrowserCore\en-US\SearchApp.exe cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\38384e6a620884 cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\sysmon.exe cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\121e5b5079f7c0 cf40b5e2332d76b97a1a1a18f89b68ef.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\AppReadiness\6203df4a6bafc7 cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Windows\security\templates\dwm.exe cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Windows\security\templates\6cb0b6c459d5d3 cf40b5e2332d76b97a1a1a18f89b68ef.exe File created C:\Windows\AppReadiness\lsass.exe cf40b5e2332d76b97a1a1a18f89b68ef.exe File opened for modification C:\Windows\AppReadiness\lsass.exe cf40b5e2332d76b97a1a1a18f89b68ef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings cf40b5e2332d76b97a1a1a18f89b68ef.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1436 schtasks.exe 348 schtasks.exe 4544 schtasks.exe 1004 schtasks.exe 1984 schtasks.exe 2664 schtasks.exe 964 schtasks.exe 3544 schtasks.exe 2648 schtasks.exe 112 schtasks.exe 3636 schtasks.exe 4428 schtasks.exe 1944 schtasks.exe 3672 schtasks.exe 2588 schtasks.exe 2468 schtasks.exe 2820 schtasks.exe 1484 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 4000 SearchApp.exe 4000 SearchApp.exe 4000 SearchApp.exe 4000 SearchApp.exe 4000 SearchApp.exe 4000 SearchApp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe Token: SeDebugPrivilege 4000 SearchApp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3124 wrote to memory of 4444 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 86 PID 3124 wrote to memory of 4444 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 86 PID 4444 wrote to memory of 1132 4444 csc.exe 88 PID 4444 wrote to memory of 1132 4444 csc.exe 88 PID 3124 wrote to memory of 2296 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 104 PID 3124 wrote to memory of 2296 3124 cf40b5e2332d76b97a1a1a18f89b68ef.exe 104 PID 2296 wrote to memory of 3128 2296 cmd.exe 106 PID 2296 wrote to memory of 3128 2296 cmd.exe 106 PID 2296 wrote to memory of 3200 2296 cmd.exe 107 PID 2296 wrote to memory of 3200 2296 cmd.exe 107 PID 2296 wrote to memory of 4000 2296 cmd.exe 108 PID 2296 wrote to memory of 4000 2296 cmd.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf40b5e2332d76b97a1a1a18f89b68ef.exe"C:\Users\Admin\AppData\Local\Temp\cf40b5e2332d76b97a1a1a18f89b68ef.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vdn4trhf\vdn4trhf.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES93C4.tmp" "c:\Windows\System32\CSC140186C38B3B4621B3BCA69C57DB79C4.TMP"3⤵PID:1132
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vi2IVPBbsr.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3128
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3200
-
-
C:\Program Files\Windows Security\BrowserCore\en-US\SearchApp.exe"C:\Program Files\Windows Security\BrowserCore\en-US\SearchApp.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Windows\security\templates\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\security\templates\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Windows\security\templates\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Windows\AppReadiness\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\AppReadiness\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Windows\AppReadiness\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cf40b5e2332d76b97a1a1a18f89b68efc" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Local\Temp\cf40b5e2332d76b97a1a1a18f89b68ef.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cf40b5e2332d76b97a1a1a18f89b68ef" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\cf40b5e2332d76b97a1a1a18f89b68ef.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cf40b5e2332d76b97a1a1a18f89b68efc" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\Temp\cf40b5e2332d76b97a1a1a18f89b68ef.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2664
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
769KB
MD5cf40b5e2332d76b97a1a1a18f89b68ef
SHA12c352c7e4521570c3cd7c99a35b715feed866f03
SHA256e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272
SHA51227ac673faa2306c572a5600195c08c875c47892df513547cfba91674e37fdd0876c2344662c81ecf00a0b3bbe515e07696b248f64e1221bec4398b3b1cff7f9a
-
Filesize
1KB
MD57caabfa754042fe7bee2eb20a2a3ac72
SHA1b830d2d3304c073e295d0a421bff540fb7d133bf
SHA256ce063bc3a9dce417f67615ce1e1bc3de89a938b6c9af2040c7c5c754e987b8c5
SHA5129f3a481b55c3c2b5e1dfba6d40dbd3a0f002597896ce0553fe7e7a34180d4f472aaa6488f1653bb1e5ba862840f1fb890b507fb58e5fd9eb610572041928bc67
-
Filesize
241B
MD556ec850faebe60ba1d61da2fa82c7c8f
SHA1a32d6a43462bb6552af0867859bd914fdb1b5b3e
SHA256dfc49a67b608589551a68e3e666c213243818919b20fa4df100f016dcf9e9934
SHA5129dc02c310e3a3a82d424c8717f10d47cc6df90127540c82c37b5f84de14540240156e1f2accdaab7e1f52a2b46676bc20d71e9870800a0ee5f85ab659421de05
-
Filesize
367B
MD5a1b17192d2a3add0d1751c1149265fa6
SHA1eee00ba83bcf1cb28675ba876da14d421349652d
SHA256546ce4ff6e832bd82c5920733c5bd2d9bb224283c8a12925e294d50debf71d06
SHA5125ea91f3b77af82dceb44dd4d1b737cb438079f96c89ba943cd7219d30a34a4cea40e3d8b60ee0ba0fca64fae78f4b27b514e8eae0e9e83fd4b1136b0d567309b
-
Filesize
235B
MD54b9e9062aeda61263d27f6f316327795
SHA10db2ef4ccd9aa4444daf9a483cb0416fcb967d1f
SHA2562cf9378fe8e49846752af83e3fc72075d0509b9bc83c97de1f377145e910e11f
SHA5122c27a0f641fd63fed0a0120b59b04e26d7d6bacf9e8acfc8dd601fa0c7dfe5580fa43888ae81208a91d477e2338343525d16a3bbf49f625eb0d449c949d65e79
-
Filesize
1KB
MD55984679060d0fc54eba47cead995f65a
SHA1f72bbbba060ac80ac6abedc7b8679e8963f63ebf
SHA2564104fdf5499f0aa7dd161568257acae002620ec385f2ede2072d4f550ecff433
SHA512bc8aadfabe5dbb4e3ea5e07a5ccbddd363400005675acda3e9cb414dc75fb0ba74f41b4a6baf34d42f85a9ae0af7d2418420c78b0c643f7243fe93a49b8140b5