Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 05:58
Behavioral task
behavioral1
Sample
f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe
Resource
win10v2004-20241007-en
General
-
Target
f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe
-
Size
2.3MB
-
MD5
7f9578cac30087f4675bbcb003ed8b5e
-
SHA1
b42579f5efbc5efa18eb442c2fc61fa90d988718
-
SHA256
f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc
-
SHA512
e2933cef7a5fe25e230e66473acf663859441cf159269db345b12ff082f88f555bf56ec565ba42c61f61db1cc742cb63f2eb77cf37ac9512b7587a56c0f4f8d1
-
SSDEEP
24576:8ITVuaZN/8RjsOUQ1svsFlreQmkaZrtdYetEfUhdHWIVqk+dKLkHXBwYlINmm4Uh:8BSe/UwPItdrtEfUhdHWIVnTLUmz0kB
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1052 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1268 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3676 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4988 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 684 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4292 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4416 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4896 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5020 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1320 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2400 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 620 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5072 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3552 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4480 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4604 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3664 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2304 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3512 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3668 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3112 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2212 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 376 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4620 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4904 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3304 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5076 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1560 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2100 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1524 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 636 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4092 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3660 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2132 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4964 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3940 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4288 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2956 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3944 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 2072 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1908 2072 schtasks.exe 82 -
resource yara_rule behavioral2/memory/3080-1-0x0000000000F50000-0x000000000119E000-memory.dmp dcrat behavioral2/files/0x000e000000023bae-18.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe -
Executes dropped EXE 1 IoCs
pid Process 1432 wininit.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\Accessories\en-US\RuntimeBroker.exe f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\9e8d7a4ca61bd9 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Program Files (x86)\Common Files\System\fr-FR\winlogon.exe f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\StartMenuExperienceHost.exe f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\55b276f4edf653 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Program Files (x86)\Windows Sidebar\wininit.exe f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\5940a34987c991 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Program Files (x86)\Windows Sidebar\56085415360792 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Program Files (x86)\Windows Multimedia Platform\ea1d8f6d871115 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Program Files (x86)\Common Files\System\fr-FR\cc11b995f2a76d f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\dllhost.exe f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\CSC\smss.exe f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Windows\DigitalLocker\en-US\services.exe f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Windows\DigitalLocker\en-US\c5b4cb5e9653cc f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-uiribbon.resources_31bf3856ad364e35_10.0.19041.1_de-de_e4d5967ecf1582ca\fontdrvhost.exe f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5076 schtasks.exe 2176 schtasks.exe 3944 schtasks.exe 1908 schtasks.exe 1560 schtasks.exe 3940 schtasks.exe 2956 schtasks.exe 1744 schtasks.exe 1268 schtasks.exe 684 schtasks.exe 620 schtasks.exe 5072 schtasks.exe 8 schtasks.exe 1284 schtasks.exe 2992 schtasks.exe 2100 schtasks.exe 1052 schtasks.exe 2400 schtasks.exe 3664 schtasks.exe 4904 schtasks.exe 2088 schtasks.exe 2860 schtasks.exe 4292 schtasks.exe 4896 schtasks.exe 3676 schtasks.exe 2304 schtasks.exe 2212 schtasks.exe 4964 schtasks.exe 3660 schtasks.exe 4416 schtasks.exe 4480 schtasks.exe 3112 schtasks.exe 4620 schtasks.exe 2700 schtasks.exe 4092 schtasks.exe 2132 schtasks.exe 4288 schtasks.exe 4988 schtasks.exe 5020 schtasks.exe 3668 schtasks.exe 1524 schtasks.exe 376 schtasks.exe 3304 schtasks.exe 636 schtasks.exe 1320 schtasks.exe 3552 schtasks.exe 4604 schtasks.exe 3512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 1432 wininit.exe 1432 wininit.exe 1432 wininit.exe 1432 wininit.exe 1432 wininit.exe 1432 wininit.exe 1432 wininit.exe 1432 wininit.exe 1432 wininit.exe 1432 wininit.exe 1432 wininit.exe 1432 wininit.exe 1432 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe Token: SeDebugPrivilege 1432 wininit.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3080 wrote to memory of 3092 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 131 PID 3080 wrote to memory of 3092 3080 f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe 131 PID 3092 wrote to memory of 1280 3092 cmd.exe 133 PID 3092 wrote to memory of 1280 3092 cmd.exe 133 PID 3092 wrote to memory of 1432 3092 cmd.exe 134 PID 3092 wrote to memory of 1432 3092 cmd.exe 134 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe"C:\Users\Admin\AppData\Local\Temp\f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\E8a6DlTa2v.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1280
-
-
C:\Users\Default\wininit.exe"C:\Users\Default\wininit.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Recent\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default\Recent\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Users\Default\Recent\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\All Users\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Users\Default User\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Downloads\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Public\Downloads\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Downloads\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Users\Default\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Default\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Users\Default\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Common Files\System\fr-FR\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\System\fr-FR\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Common Files\System\fr-FR\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:8
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Windows\DigitalLocker\en-US\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\DigitalLocker\en-US\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Windows\DigitalLocker\en-US\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Sidebar\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Templates\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\All Users\Templates\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Templates\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193B
MD575e681b5a8da5d23dcd91c6e74da7302
SHA129344d746e89bc1f778938b78f4658e528a40d88
SHA2564fc1949ee7973c753ac7ed42b369d6b5a50f43a1f04a4a852d5ce096de5a0623
SHA5128267059331646da63ac026b35397acb0fe9dcebae76cf22cc8c98b1f218ade4e2f96707ceb0dc10ac6c00852bb90d6bc3325e4b4052179ef238c76f838825b52
-
Filesize
2.3MB
MD57f9578cac30087f4675bbcb003ed8b5e
SHA1b42579f5efbc5efa18eb442c2fc61fa90d988718
SHA256f732f0392878698cc5d43a9d8129c3b16eaa6cc4b50a79b548a32dde7a0456bc
SHA512e2933cef7a5fe25e230e66473acf663859441cf159269db345b12ff082f88f555bf56ec565ba42c61f61db1cc742cb63f2eb77cf37ac9512b7587a56c0f4f8d1