Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 12:55
Behavioral task
behavioral1
Sample
3473e4f724dbe6f719b6e02945fd8e92.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3473e4f724dbe6f719b6e02945fd8e92.exe
Resource
win10v2004-20250129-en
General
-
Target
3473e4f724dbe6f719b6e02945fd8e92.exe
-
Size
22.3MB
-
MD5
3473e4f724dbe6f719b6e02945fd8e92
-
SHA1
260a8c3c4a9759e21173ba58353203120418ac18
-
SHA256
85fffd5634882bd2eb4f667d225cba962ef6e49d1a497ec7139df3ff41c38fe3
-
SHA512
10f6802d6d8c54dfdf3e534b7b693c11597ff919e6f32777fc37715a0fbf68e13a37774c6981b8e2bda726f58e4042cc82c0b48744b495d49e2675eeb088f439
-
SSDEEP
393216:UDtdcuudxlyNom7rqzvP11bfVuJVy+GDBFlc64sb6BcYCJ3lBVi6rkA+LbFIDVwq:src7lyNosOj+I+GaxQ6B9CJ3nY6rkA+G
Malware Config
Signatures
-
DcRat 44 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1664 schtasks.exe 1328 schtasks.exe File created C:\Windows\Offline Web Pages\1610b97d3ab4a7 surrogatebrowserdll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3473e4f724dbe6f719b6e02945fd8e92.exe 2728 schtasks.exe 1056 schtasks.exe 1292 schtasks.exe 1224 schtasks.exe 2108 schtasks.exe 320 schtasks.exe 2404 schtasks.exe 1284 schtasks.exe 1020 schtasks.exe 2036 schtasks.exe 2092 schtasks.exe 872 schtasks.exe 2344 schtasks.exe 2236 schtasks.exe 1968 schtasks.exe 1856 schtasks.exe 592 schtasks.exe 2860 schtasks.exe 1872 schtasks.exe 1360 schtasks.exe 2044 schtasks.exe 944 schtasks.exe 712 schtasks.exe 304 schtasks.exe 2328 schtasks.exe 1148 schtasks.exe 2700 schtasks.exe 1804 schtasks.exe 2980 schtasks.exe 2896 schtasks.exe 2992 schtasks.exe 1208 schtasks.exe 2272 schtasks.exe 2604 schtasks.exe 1720 schtasks.exe 968 schtasks.exe 1568 schtasks.exe 2156 schtasks.exe 2416 schtasks.exe 2088 schtasks.exe -
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\", \"C:\\Users\\Default\\Favorites\\sppsvc.exe\", \"C:\\Program Files\\Windows Media Player\\ja-JP\\smss.exe\", \"C:\\Windows\\Help\\Windows\\ja-JP\\OSPPSVC.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\", \"C:\\Users\\Default\\Favorites\\sppsvc.exe\", \"C:\\Program Files\\Windows Media Player\\ja-JP\\smss.exe\", \"C:\\Windows\\Help\\Windows\\ja-JP\\OSPPSVC.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\de\\OSPPSVC.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\", \"C:\\Users\\Default\\Favorites\\sppsvc.exe\", \"C:\\Program Files\\Windows Media Player\\ja-JP\\smss.exe\", \"C:\\Windows\\Help\\Windows\\ja-JP\\OSPPSVC.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\de\\OSPPSVC.exe\", \"C:\\Users\\Public\\Documents\\My Music\\WmiPrvSE.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\", \"C:\\Users\\Default\\Favorites\\sppsvc.exe\", \"C:\\Program Files\\Windows Media Player\\ja-JP\\smss.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\", \"C:\\Users\\Default\\Favorites\\sppsvc.exe\", \"C:\\Program Files\\Windows Media Player\\ja-JP\\smss.exe\", \"C:\\Windows\\Help\\Windows\\ja-JP\\OSPPSVC.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\de\\OSPPSVC.exe\", \"C:\\Users\\Public\\Documents\\My Music\\WmiPrvSE.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsass.exe\", \"C:\\Windows\\Branding\\ShellBrd\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\spoolsv.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\", \"C:\\Users\\Default\\Favorites\\sppsvc.exe\", \"C:\\Program Files\\Windows Media Player\\ja-JP\\smss.exe\", \"C:\\Windows\\Help\\Windows\\ja-JP\\OSPPSVC.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\de\\OSPPSVC.exe\", \"C:\\Users\\Public\\Documents\\My Music\\WmiPrvSE.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsass.exe\", \"C:\\Windows\\Branding\\ShellBrd\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\spoolsv.exe\", \"C:\\Program Files\\Windows Media Player\\csrss.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\", \"C:\\Users\\Default\\Favorites\\sppsvc.exe\", \"C:\\Program Files\\Windows Media Player\\ja-JP\\smss.exe\", \"C:\\Windows\\Help\\Windows\\ja-JP\\OSPPSVC.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\de\\OSPPSVC.exe\", \"C:\\Users\\Public\\Documents\\My Music\\WmiPrvSE.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsass.exe\", \"C:\\Windows\\Branding\\ShellBrd\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\spoolsv.exe\", \"C:\\Program Files\\Windows Media Player\\csrss.exe\", \"C:\\Windows\\fr-FR\\smss.exe\", \"C:\\Program Files\\Internet Explorer\\OSPPSVC.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\", \"C:\\Users\\Default\\Favorites\\sppsvc.exe\", \"C:\\Program Files\\Windows Media Player\\ja-JP\\smss.exe\", \"C:\\Windows\\Help\\Windows\\ja-JP\\OSPPSVC.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\de\\OSPPSVC.exe\", \"C:\\Users\\Public\\Documents\\My Music\\WmiPrvSE.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsass.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\", \"C:\\Users\\Default\\Favorites\\sppsvc.exe\", \"C:\\Program Files\\Windows Media Player\\ja-JP\\smss.exe\", \"C:\\Windows\\Help\\Windows\\ja-JP\\OSPPSVC.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\de\\OSPPSVC.exe\", \"C:\\Users\\Public\\Documents\\My Music\\WmiPrvSE.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsass.exe\", \"C:\\Windows\\Branding\\ShellBrd\\dllhost.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\", \"C:\\Users\\Default\\Favorites\\sppsvc.exe\", \"C:\\Program Files\\Windows Media Player\\ja-JP\\smss.exe\", \"C:\\Windows\\Help\\Windows\\ja-JP\\OSPPSVC.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\de\\OSPPSVC.exe\", \"C:\\Users\\Public\\Documents\\My Music\\WmiPrvSE.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsass.exe\", \"C:\\Windows\\Branding\\ShellBrd\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\spoolsv.exe\", \"C:\\Program Files\\Windows Media Player\\csrss.exe\", \"C:\\Windows\\fr-FR\\smss.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\", \"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\", \"C:\\Users\\Default\\Favorites\\sppsvc.exe\"" surrogatebrowserdll.exe -
Process spawned unexpected child process 42 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 320 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2728 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 944 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2896 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1056 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1208 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1292 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1224 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 872 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2404 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2416 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1856 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1020 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1872 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 712 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1720 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 968 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1360 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2092 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 592 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1568 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 304 2628 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1968 2628 schtasks.exe 35 -
UAC bypass 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" surrogatebrowserdll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" surrogatebrowserdll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" surrogatebrowserdll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" lsass.exe -
resource yara_rule behavioral1/files/0x0008000000016ce8-11.dat dcrat behavioral1/memory/2828-15-0x0000000001230000-0x0000000001398000-memory.dmp dcrat behavioral1/memory/1392-83-0x0000000000240000-0x00000000003A8000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 5 IoCs
pid Process 2828 surrogatebrowserdll.exe 2448 compact.exe 2292 compact.exe 1216 Process not Found 1392 lsass.exe -
Loads dropped DLL 5 IoCs
pid Process 2776 cmd.exe 2776 cmd.exe 2776 cmd.exe 2292 compact.exe 1216 Process not Found -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\spoolsv.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Users\\Default\\Favorites\\sppsvc.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files\\Windows Media Player\\ja-JP\\smss.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Windows\\Help\\Windows\\ja-JP\\OSPPSVC.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\Branding\\ShellBrd\\dllhost.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows Media Player\\csrss.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files\\VideoLAN\\VLC\\hrtfs\\spoolsv.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\fr-FR\\smss.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\de\\OSPPSVC.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\fr-FR\\smss.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsm.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Users\\Default\\Favorites\\sppsvc.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files\\Windows Media Player\\ja-JP\\smss.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\de\\OSPPSVC.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Users\\Public\\Documents\\My Music\\WmiPrvSE.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsass.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\spoolsv.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Windows\\Offline Web Pages\\OSPPSVC.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Windows\\Help\\Windows\\ja-JP\\OSPPSVC.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Recovery\\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\\lsass.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows Media Player\\csrss.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\Branding\\ShellBrd\\dllhost.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files\\Internet Explorer\\OSPPSVC.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Users\\Public\\Documents\\My Music\\WmiPrvSE.exe\"" surrogatebrowserdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files\\Internet Explorer\\OSPPSVC.exe\"" surrogatebrowserdll.exe -
Checks whether UAC is enabled 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" surrogatebrowserdll.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA surrogatebrowserdll.exe -
resource yara_rule behavioral1/files/0x000500000001a489-76.dat upx behavioral1/memory/2292-78-0x000007FEF56C0000-0x000007FEF5B26000-memory.dmp upx -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\OSPPSVC.exe surrogatebrowserdll.exe File created C:\Program Files\VideoLAN\VLC\hrtfs\spoolsv.exe surrogatebrowserdll.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\OSPPSVC.exe surrogatebrowserdll.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\1610b97d3ab4a7 surrogatebrowserdll.exe File created C:\Program Files\Windows Media Player\886983d96e3d3e surrogatebrowserdll.exe File created C:\Program Files\Internet Explorer\1610b97d3ab4a7 surrogatebrowserdll.exe File created C:\Program Files\VideoLAN\VLC\hrtfs\f3b6ecef712a24 surrogatebrowserdll.exe File created C:\Program Files\Windows Media Player\ja-JP\smss.exe surrogatebrowserdll.exe File created C:\Program Files\Windows Media Player\ja-JP\69ddcba757bf72 surrogatebrowserdll.exe File created C:\Program Files\Windows Media Player\csrss.exe surrogatebrowserdll.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Help\Windows\ja-JP\1610b97d3ab4a7 surrogatebrowserdll.exe File created C:\Windows\Branding\ShellBrd\dllhost.exe surrogatebrowserdll.exe File created C:\Windows\winsxs\x86_microsoft-windows-m..c-oracle-driver-dll_31bf3856ad364e35_6.1.7601.17514_none_6b16a37ea1353bb1\Idle.exe surrogatebrowserdll.exe File opened for modification C:\Windows\Offline Web Pages\OSPPSVC.exe surrogatebrowserdll.exe File created C:\Windows\Offline Web Pages\1610b97d3ab4a7 surrogatebrowserdll.exe File created C:\Windows\Help\Windows\ja-JP\OSPPSVC.exe surrogatebrowserdll.exe File created C:\Windows\Branding\ShellBrd\5940a34987c991 surrogatebrowserdll.exe File created C:\Windows\fr-FR\smss.exe surrogatebrowserdll.exe File created C:\Windows\fr-FR\69ddcba757bf72 surrogatebrowserdll.exe File created C:\Windows\Offline Web Pages\OSPPSVC.exe surrogatebrowserdll.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0008000000016d04-59.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3473e4f724dbe6f719b6e02945fd8e92.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2128 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2108 schtasks.exe 592 schtasks.exe 1804 schtasks.exe 1292 schtasks.exe 872 schtasks.exe 712 schtasks.exe 1720 schtasks.exe 1360 schtasks.exe 320 schtasks.exe 2044 schtasks.exe 1664 schtasks.exe 2404 schtasks.exe 2416 schtasks.exe 1224 schtasks.exe 2604 schtasks.exe 1568 schtasks.exe 304 schtasks.exe 2328 schtasks.exe 1856 schtasks.exe 1872 schtasks.exe 968 schtasks.exe 2236 schtasks.exe 2980 schtasks.exe 2992 schtasks.exe 1020 schtasks.exe 1148 schtasks.exe 2272 schtasks.exe 2088 schtasks.exe 2344 schtasks.exe 2728 schtasks.exe 944 schtasks.exe 2860 schtasks.exe 1284 schtasks.exe 2036 schtasks.exe 2156 schtasks.exe 1968 schtasks.exe 2092 schtasks.exe 2700 schtasks.exe 2896 schtasks.exe 1056 schtasks.exe 1208 schtasks.exe 1328 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2828 surrogatebrowserdll.exe 2828 surrogatebrowserdll.exe 2828 surrogatebrowserdll.exe 2828 surrogatebrowserdll.exe 2828 surrogatebrowserdll.exe 1392 lsass.exe 1392 lsass.exe 1392 lsass.exe 1392 lsass.exe 1392 lsass.exe 1392 lsass.exe 1392 lsass.exe 1392 lsass.exe 1392 lsass.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1392 lsass.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2828 surrogatebrowserdll.exe Token: SeDebugPrivilege 1392 lsass.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1948 wrote to memory of 328 1948 3473e4f724dbe6f719b6e02945fd8e92.exe 30 PID 1948 wrote to memory of 328 1948 3473e4f724dbe6f719b6e02945fd8e92.exe 30 PID 1948 wrote to memory of 328 1948 3473e4f724dbe6f719b6e02945fd8e92.exe 30 PID 1948 wrote to memory of 328 1948 3473e4f724dbe6f719b6e02945fd8e92.exe 30 PID 328 wrote to memory of 2776 328 WScript.exe 31 PID 328 wrote to memory of 2776 328 WScript.exe 31 PID 328 wrote to memory of 2776 328 WScript.exe 31 PID 328 wrote to memory of 2776 328 WScript.exe 31 PID 2776 wrote to memory of 2828 2776 cmd.exe 33 PID 2776 wrote to memory of 2828 2776 cmd.exe 33 PID 2776 wrote to memory of 2828 2776 cmd.exe 33 PID 2776 wrote to memory of 2828 2776 cmd.exe 33 PID 2828 wrote to memory of 288 2828 surrogatebrowserdll.exe 78 PID 2828 wrote to memory of 288 2828 surrogatebrowserdll.exe 78 PID 2828 wrote to memory of 288 2828 surrogatebrowserdll.exe 78 PID 2776 wrote to memory of 2128 2776 cmd.exe 80 PID 2776 wrote to memory of 2128 2776 cmd.exe 80 PID 2776 wrote to memory of 2128 2776 cmd.exe 80 PID 2776 wrote to memory of 2128 2776 cmd.exe 80 PID 288 wrote to memory of 2444 288 cmd.exe 81 PID 288 wrote to memory of 2444 288 cmd.exe 81 PID 288 wrote to memory of 2444 288 cmd.exe 81 PID 2776 wrote to memory of 2448 2776 cmd.exe 82 PID 2776 wrote to memory of 2448 2776 cmd.exe 82 PID 2776 wrote to memory of 2448 2776 cmd.exe 82 PID 2776 wrote to memory of 2448 2776 cmd.exe 82 PID 2448 wrote to memory of 2292 2448 compact.exe 83 PID 2448 wrote to memory of 2292 2448 compact.exe 83 PID 2448 wrote to memory of 2292 2448 compact.exe 83 PID 288 wrote to memory of 1392 288 cmd.exe 84 PID 288 wrote to memory of 1392 288 cmd.exe 84 PID 288 wrote to memory of 1392 288 cmd.exe 84 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" surrogatebrowserdll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" surrogatebrowserdll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" surrogatebrowserdll.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3473e4f724dbe6f719b6e02945fd8e92.exe"C:\Users\Admin\AppData\Local\Temp\3473e4f724dbe6f719b6e02945fd8e92.exe"1⤵
- DcRat
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\comhost\guXpGjO4zLq.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\comhost\BLFWFkGLPiVJO3IqiKn.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\comhost\surrogatebrowserdll.exe"C:\comhost\surrogatebrowserdll.exe"4⤵
- DcRat
- Modifies WinLogon for persistence
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2828 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\06rLEYGb3M.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2444
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\lsass.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\lsass.exe"6⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1392
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2128
-
-
C:\comhost\compact.execompact.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\comhost\compact.execompact.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2292
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Windows\Offline Web Pages\OSPPSVC.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\Offline Web Pages\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\Windows\Offline Web Pages\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Program Files\VideoLAN\VLC\hrtfs\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\hrtfs\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Program Files\VideoLAN\VLC\hrtfs\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\lsm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Favorites\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\Favorites\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Favorites\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Media Player\ja-JP\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\ja-JP\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Media Player\ja-JP\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Windows\Help\Windows\ja-JP\OSPPSVC.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\Help\Windows\ja-JP\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Windows\Help\Windows\ja-JP\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 8 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\OSPPSVC.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 7 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Documents\My Music\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Public\Documents\My Music\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Documents\My Music\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\lsass.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Windows\Branding\ShellBrd\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Branding\ShellBrd\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Windows\Branding\ShellBrd\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Media Player\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Media Player\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Windows\fr-FR\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\fr-FR\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Windows\fr-FR\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 11 /tr "'C:\Program Files\Internet Explorer\OSPPSVC.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Program Files\Internet Explorer\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1968
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223B
MD5fd6f8dd3e6744448037a3d5189b996fe
SHA142f2c4726b1faf21ddd86df0fe8c43f72fa216b3
SHA256c24fe385dc8b02260ee0531128fcc16d78afdc254bb6cbeb7cdad74146793054
SHA512026f72f2ba506de9cfdf6d0a65d54a9d5f2b4b4da2ebd272c9008087e23c25a3a37be4c23b7104370b4fbc1023153a9fbe3bf5ab038d971fe4da1725a9f67a15
-
Filesize
1.4MB
MD572c65de0cc88d6a26d5a7040aaf1fb60
SHA168dae332ade43106c72e68a497b6b7df6b314425
SHA256769f20bcec63eb6567cca095ea59ffcda2c87e2b8600503f0e4f976dfb8da2bb
SHA5125f658e0bee185613a37f946069ac6723fff93e542a4eb6e3435766c58d09d82894b85502f1686ffc9318bdf4b3a858490866ca56b90238c8c903e794c3a4e3fb
-
Filesize
167B
MD5e6d45f4ca208778bc4eff7af11c6d395
SHA1323d431d91c277436626f0a06c4c4d5cfaa30a4c
SHA25662e8637515e65993310edef622c1dd4bf887169f990d6e1ef6f4e2abe05b08f6
SHA5129e477e63601cab2db9abbd1cf0e15ae82c76cd1ce1ea15b7d39ee406e195cbfbd0f768db87449a23d184986d7ba0a0f4d3debfba88438dcfa0c52387d385574d
-
Filesize
203B
MD5681ee5cace3c8cc890294f2978b7ecc8
SHA1b9cc792a9634ebccae6e26db14c1abbb1f2a1444
SHA25601e8ad969c5a3edf562c337f2afdad0edf0e6f0a23a1000cb8ec28464bacc2bb
SHA5122f95e54bf472b714c3c0a5d24b73da83edff075997bb19f72c5c642d02f732733498673b9cb0bcc8f14ab859df847b1b32dc9b5a9d02b01cb93ece2b981abb28
-
Filesize
20.8MB
MD517babc75d1cc5aaf31d53844c1322563
SHA1e599c7cec596484387568762c34d69ba875d705d
SHA25678348765157b016dfba8071294b4eae270b4c13a7f2ad4ae4bedd7de49826c65
SHA512f27007cb825f5b1d2e2fd45277aaae2a161423b0bf6d55d3026852e3da86f6178f9922e18e563dec938a43c48f29a9587f462dadc8ae2713bd6babdcf9673dc8
-
Filesize
1.4MB
MD5344f880d24b33c2df68542f45e93e1c7
SHA14afb2c1108541f5fc6e5b1e2ff52cb3b5c92d779
SHA256d7040804f9de76907808df400d9b1d3337f0765fbd43bd04a03de2ee9453cbcf
SHA512a6e34c56c377ab5473d15280caab32ae7e830570226e6996fc5766ba1f6e5496eb01af975497bb0cbdc11f066870fc087bb6d638248d52d64e2de8f78e9f7079