Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 08:50
Static task
static1
Behavioral task
behavioral1
Sample
9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe
Resource
win10v2004-20250129-en
General
-
Target
9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe
-
Size
1.9MB
-
MD5
aae1c0e394855b9138d9d540a884eb1c
-
SHA1
76443a092ea47adebb55e663c8299c495dd9e324
-
SHA256
9f09328091800505339ee1a9f01b6a7646ed60d2ed21808b5e171175f1723b6b
-
SHA512
a3bda818e3c84e16ae7788ecf4bce9712ab23a152ff164a5cb4e3723e8145ad912cbdc7c2902bb937812e9335733e8252b015eef92d4745b17403a632cbf7322
-
SSDEEP
49152:HU7L1b7b3wCVJFpcHWhW8bLoym4ZEu9eBknBe6Y:HU7hbXAagWc8fo4ZESc6
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\csrss.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\ja-JP\\upfc.exe\", \"C:\\Windows\\Panther\\setup.exe\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Windows\\Migration\\WTR\\winlogon.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\csrss.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\csrss.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\ja-JP\\upfc.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\csrss.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\ja-JP\\upfc.exe\", \"C:\\Windows\\Panther\\setup.exe\\dllhost.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\csrss.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\ja-JP\\upfc.exe\", \"C:\\Windows\\Panther\\setup.exe\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\csrss.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\ja-JP\\upfc.exe\", \"C:\\Windows\\Panther\\setup.exe\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Windows\\Migration\\WTR\\winlogon.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3540 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4004 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 828 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3348 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3584 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3832 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 112 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4804 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1436 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3552 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1496 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3612 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4400 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1668 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4776 208 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3140 208 schtasks.exe 87 -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1256 powershell.exe 5104 powershell.exe 4112 powershell.exe 3436 powershell.exe 3412 powershell.exe 5084 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe -
Executes dropped EXE 1 IoCs
pid Process 1960 winlogon.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\WindowsRE\\dllhost.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\Migration\\WTR\\winlogon.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9f09328091800505339ee1a9f01b6a7646ed60d2ed218 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\csrss.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\Panther\\setup.exe\\dllhost.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Program Files (x86)\\Internet Explorer\\ja-JP\\upfc.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\Panther\\setup.exe\\dllhost.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\WindowsRE\\dllhost.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\Migration\\WTR\\winlogon.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9f09328091800505339ee1a9f01b6a7646ed60d2ed218 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\fr-FR\\csrss.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Program Files (x86)\\Internet Explorer\\ja-JP\\upfc.exe\"" 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ipinfo.io 48 ipinfo.io 49 ipinfo.io 15 ipinfo.io -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCA0F7FF23B470426DA76F21F3D71E1B4.TMP csc.exe File created \??\c:\Windows\System32\lxswus.exe csc.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\ja-JP\upfc.exe 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\ea1d8f6d871115 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\csrss.exe 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\886983d96e3d3e 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Migration\WTR\winlogon.exe 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe File created C:\Windows\Migration\WTR\cc11b995f2a76d 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe File created C:\Windows\Panther\setup.exe\dllhost.exe 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe File created C:\Windows\Panther\setup.exe\5940a34987c991 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe File created C:\Windows\Migration\WTR\winlogon.exe 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4984 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4984 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3540 schtasks.exe 1496 schtasks.exe 2860 schtasks.exe 1692 schtasks.exe 3348 schtasks.exe 3832 schtasks.exe 4804 schtasks.exe 3612 schtasks.exe 4776 schtasks.exe 3140 schtasks.exe 4004 schtasks.exe 828 schtasks.exe 3584 schtasks.exe 112 schtasks.exe 3552 schtasks.exe 1436 schtasks.exe 4400 schtasks.exe 1668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1960 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe Token: SeDebugPrivilege 4112 powershell.exe Token: SeDebugPrivilege 5084 powershell.exe Token: SeDebugPrivilege 1256 powershell.exe Token: SeDebugPrivilege 3436 powershell.exe Token: SeDebugPrivilege 5104 powershell.exe Token: SeDebugPrivilege 3412 powershell.exe Token: SeDebugPrivilege 1960 winlogon.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1632 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 91 PID 1788 wrote to memory of 1632 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 91 PID 1632 wrote to memory of 824 1632 csc.exe 93 PID 1632 wrote to memory of 824 1632 csc.exe 93 PID 1788 wrote to memory of 3412 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 112 PID 1788 wrote to memory of 3412 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 112 PID 1788 wrote to memory of 5084 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 113 PID 1788 wrote to memory of 5084 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 113 PID 1788 wrote to memory of 1256 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 114 PID 1788 wrote to memory of 1256 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 114 PID 1788 wrote to memory of 5104 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 115 PID 1788 wrote to memory of 5104 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 115 PID 1788 wrote to memory of 4112 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 116 PID 1788 wrote to memory of 4112 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 116 PID 1788 wrote to memory of 3436 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 117 PID 1788 wrote to memory of 3436 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 117 PID 1788 wrote to memory of 768 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 124 PID 1788 wrote to memory of 768 1788 9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe 124 PID 768 wrote to memory of 1548 768 cmd.exe 126 PID 768 wrote to memory of 1548 768 cmd.exe 126 PID 768 wrote to memory of 4984 768 cmd.exe 127 PID 768 wrote to memory of 4984 768 cmd.exe 127 PID 768 wrote to memory of 1960 768 cmd.exe 131 PID 768 wrote to memory of 1960 768 cmd.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe"C:\Users\Admin\AppData\Local\Temp\9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jss2ycdn\jss2ycdn.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAC9B.tmp" "c:\Windows\System32\CSCA0F7FF23B470426DA76F21F3D71E1B4.TMP"3⤵PID:824
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\csrss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\ja-JP\upfc.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Panther\setup.exe\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Migration\WTR\winlogon.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\l8KlzpEP1l.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1548
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4984
-
-
C:\Windows\Migration\WTR\winlogon.exe"C:\Windows\Migration\WTR\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Internet Explorer\ja-JP\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\ja-JP\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\ja-JP\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Windows\Panther\setup.exe\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Panther\setup.exe\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\Panther\setup.exe\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Windows\Migration\WTR\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\Migration\WTR\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Windows\Migration\WTR\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "9f09328091800505339ee1a9f01b6a7646ed60d2ed2189" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Local\Temp\9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "9f09328091800505339ee1a9f01b6a7646ed60d2ed218" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "9f09328091800505339ee1a9f01b6a7646ed60d2ed2189" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Local\Temp\9f09328091800505339ee1a9f01b6a7646ed60d2ed218.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3140
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5aae1c0e394855b9138d9d540a884eb1c
SHA176443a092ea47adebb55e663c8299c495dd9e324
SHA2569f09328091800505339ee1a9f01b6a7646ed60d2ed21808b5e171175f1723b6b
SHA512a3bda818e3c84e16ae7788ecf4bce9712ab23a152ff164a5cb4e3723e8145ad912cbdc7c2902bb937812e9335733e8252b015eef92d4745b17403a632cbf7322
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
944B
MD52979eabc783eaca50de7be23dd4eafcf
SHA1d709ce5f3a06b7958a67e20870bfd95b83cad2ea
SHA256006cca90e78fbb571532a83082ac6712721a34ea4b21f490058ffb3f521f4903
SHA51292bc433990572d9427d0c93eef9bd1cc23fa00ed60dd0c9c983d87d3421e02ce3f156c6f88fe916ef6782dbf185cbce083bc0094f8c527f302be6a37d1c53aba
-
Filesize
1KB
MD5deb6facb70ecc93164d0be636a578302
SHA1ea56e0b1542020c6ccc34ca9f0d8e0006e9e7023
SHA256e7e39eac26011e6c190562e94c93c24285055106a08231a967f1dd46660d35e3
SHA5124dae3144b372eba5b48b5cb33382d85860a2359b52ee60790794a54359dce6b5948c6a1f1f37e2bce0effe2a5b80753dc6ed9fb3eb9a28c0a36a783cb2206431
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
165B
MD5a99b05cdbdaad7555f96a1e9eeec26b8
SHA100184b2c2be5c55e5c7ddc9aa7e4bd9c81b65744
SHA2561fdfdfffb746c5952c1e417947423f729470cf112fccd70680a78fda9bc492a6
SHA5128cc1e4d57666364cd1c7245a7fc82f57bc533ee750756d081110ee4f09997eb66c306ae5ed85e285f7baab37009b7553230b5543bb282fab65805976805f7022
-
Filesize
391B
MD535fec35a46e93eb597d138dbae067434
SHA16a02221dcde10be10f15820a5537c191d9c9cd20
SHA2568dfd8d5313de8158fd66a811a584938a8755b30547309d799ea2c85f38c2a549
SHA512675c937060c83f2dd910509c8a92542c7048aa4f426510bd7c4fd21055c684c7d59e3c979795208050c73720477113e770d5da33ea545c868ca294d6911c2bd4
-
Filesize
235B
MD549bef56cd848964594cdd8289726813b
SHA16dfee3b6070aa33ed9be45dd08f0cc4c6b746476
SHA2563d4443637a68a1a888befe1cd8a02a24b9791bf3d642ffd28071de4f8b4df6ea
SHA512d8b0a42bcfb9edb08145d511ccb9064a5cebf28a2e8c626604aab316f36d51f4d87cf0f8cb8230a1965c9571885954dc7ca6fabddd7a757bef4ecca16f2a8a8a
-
Filesize
1KB
MD572f89171a1931b941e3fcc281bfc549e
SHA19648145810bb8b9ecef682a8215a08065723852e
SHA256b1858806d65859b1f0607bdb45b33cbc0745c496a45414b6833c94a5a792a938
SHA51204e9a596bc2354251ef44848eb1662658b053fd6065369c8ca46f6c597516738d57efafe9669fb9d20dbe4b957d6afa379fc48a06c252260419a82de72e4cf8a