Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 17:39
Static task
static1
Behavioral task
behavioral1
Sample
incore.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
incore.exe
Resource
win10v2004-20250207-en
General
-
Target
incore.exe
-
Size
2.1MB
-
MD5
03d4e131a10bf6c41d45c0918a9e3ea5
-
SHA1
e067835a072ceb0d3cc3dd12e8a6d1a43f4d8bb7
-
SHA256
5daab1d2ee0966832a50b6cc7635707a18d81105d51614c75d106c16ff8012c2
-
SHA512
225ca4831acbe4a243e033dae107f92e1bbcad6430ae96f0ec8235fd4adf199b5f80f94457a036369816c6e92f5429e4bfb7cc9e5b644d5bf480816f643cefb0
-
SSDEEP
24576:2TbBv5rUyXVxp8qWcx5AkyZrtziLafchZChMHTzC6SXYdzNyCzrgEctNjfRn5rEp:IBJXcJQLa0hs2HTbbtNhzrgZnp5rEp
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Adobe\\unsecapp.exe\", \"C:\\Program Files (x86)\\Adobe\\explorer.exe\", \"C:\\Program Files\\Windows Defender\\it-IT\\csrss.exe\", \"C:\\Users\\Default User\\dllhost.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Adobe\\unsecapp.exe\", \"C:\\Program Files (x86)\\Adobe\\explorer.exe\", \"C:\\Program Files\\Windows Defender\\it-IT\\csrss.exe\", \"C:\\Users\\Default User\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Adobe\\unsecapp.exe\", \"C:\\Program Files (x86)\\Adobe\\explorer.exe\", \"C:\\Program Files\\Windows Defender\\it-IT\\csrss.exe\", \"C:\\Users\\Default User\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\fontCrtmonitor\\hypercomCrtMonitor.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Adobe\\unsecapp.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Adobe\\unsecapp.exe\", \"C:\\Program Files (x86)\\Adobe\\explorer.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Adobe\\unsecapp.exe\", \"C:\\Program Files (x86)\\Adobe\\explorer.exe\", \"C:\\Program Files\\Windows Defender\\it-IT\\csrss.exe\"" hypercomCrtMonitor.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3920 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2212 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3668 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3768 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1844 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2016 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3884 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1912 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3108 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4552 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4660 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 464 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4524 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4684 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 980 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3624 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3908 4020 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 556 4020 schtasks.exe 83 -
Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2180 powershell.exe 2304 powershell.exe 5020 powershell.exe 4728 powershell.exe 4232 powershell.exe 1664 powershell.exe 4408 powershell.exe 2448 powershell.exe 760 powershell.exe 4584 powershell.exe 2844 powershell.exe 4828 powershell.exe 2608 powershell.exe 4868 powershell.exe 4428 powershell.exe 4440 powershell.exe 860 powershell.exe 3076 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\Control Panel\International\Geo\Nation incore.exe Key value queried \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\Control Panel\International\Geo\Nation hypercomCrtMonitor.exe -
Executes dropped EXE 2 IoCs
pid Process 964 hypercomCrtMonitor.exe 540 unsecapp.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Recovery\\WindowsRE\\Registry.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Recovery\\WindowsRE\\Registry.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hypercomCrtMonitor = "\"C:\\fontCrtmonitor\\hypercomCrtMonitor.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hypercomCrtMonitor = "\"C:\\fontCrtmonitor\\hypercomCrtMonitor.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files (x86)\\Adobe\\explorer.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows Defender\\it-IT\\csrss.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files (x86)\\Adobe\\explorer.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows Defender\\it-IT\\csrss.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Default User\\dllhost.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Default User\\dllhost.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Program Files (x86)\\Adobe\\unsecapp.exe\"" hypercomCrtMonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Program Files (x86)\\Adobe\\unsecapp.exe\"" hypercomCrtMonitor.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io 3 ipinfo.io -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC5F505F58D8A54FEFA01F43D21A4D228A.TMP csc.exe File created \??\c:\Windows\System32\nzzy1f.exe csc.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Windows Defender\it-IT\csrss.exe hypercomCrtMonitor.exe File created C:\Program Files\Windows Defender\it-IT\886983d96e3d3e hypercomCrtMonitor.exe File created C:\Program Files (x86)\Adobe\explorer.exe hypercomCrtMonitor.exe File created C:\Program Files (x86)\Adobe\7a0fd90576e088 hypercomCrtMonitor.exe File created C:\Program Files (x86)\Adobe\unsecapp.exe hypercomCrtMonitor.exe File created C:\Program Files (x86)\Adobe\29c1c3cc0f7685 hypercomCrtMonitor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language incore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000_Classes\Local Settings incore.exe Key created \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000_Classes\Local Settings hypercomCrtMonitor.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3920 schtasks.exe 3668 schtasks.exe 1844 schtasks.exe 1912 schtasks.exe 4660 schtasks.exe 2212 schtasks.exe 3768 schtasks.exe 3884 schtasks.exe 4552 schtasks.exe 4684 schtasks.exe 980 schtasks.exe 2016 schtasks.exe 464 schtasks.exe 4524 schtasks.exe 3908 schtasks.exe 3108 schtasks.exe 3624 schtasks.exe 556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe 964 hypercomCrtMonitor.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 964 hypercomCrtMonitor.exe Token: SeDebugPrivilege 4428 powershell.exe Token: SeDebugPrivilege 2304 powershell.exe Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 4828 powershell.exe Token: SeDebugPrivilege 4440 powershell.exe Token: SeDebugPrivilege 2180 powershell.exe Token: SeDebugPrivilege 5020 powershell.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 4232 powershell.exe Token: SeDebugPrivilege 3076 powershell.exe Token: SeDebugPrivilege 860 powershell.exe Token: SeDebugPrivilege 1664 powershell.exe Token: SeDebugPrivilege 760 powershell.exe Token: SeDebugPrivilege 4728 powershell.exe Token: SeDebugPrivilege 4408 powershell.exe Token: SeDebugPrivilege 4868 powershell.exe Token: SeDebugPrivilege 4584 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeDebugPrivilege 540 unsecapp.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2496 2388 incore.exe 79 PID 2388 wrote to memory of 2496 2388 incore.exe 79 PID 2388 wrote to memory of 2496 2388 incore.exe 79 PID 2496 wrote to memory of 4024 2496 WScript.exe 80 PID 2496 wrote to memory of 4024 2496 WScript.exe 80 PID 2496 wrote to memory of 4024 2496 WScript.exe 80 PID 4024 wrote to memory of 964 4024 cmd.exe 82 PID 4024 wrote to memory of 964 4024 cmd.exe 82 PID 964 wrote to memory of 2652 964 hypercomCrtMonitor.exe 87 PID 964 wrote to memory of 2652 964 hypercomCrtMonitor.exe 87 PID 2652 wrote to memory of 320 2652 csc.exe 89 PID 2652 wrote to memory of 320 2652 csc.exe 89 PID 964 wrote to memory of 4408 964 hypercomCrtMonitor.exe 105 PID 964 wrote to memory of 4408 964 hypercomCrtMonitor.exe 105 PID 964 wrote to memory of 1664 964 hypercomCrtMonitor.exe 106 PID 964 wrote to memory of 1664 964 hypercomCrtMonitor.exe 106 PID 964 wrote to memory of 2304 964 hypercomCrtMonitor.exe 107 PID 964 wrote to memory of 2304 964 hypercomCrtMonitor.exe 107 PID 964 wrote to memory of 4428 964 hypercomCrtMonitor.exe 108 PID 964 wrote to memory of 4428 964 hypercomCrtMonitor.exe 108 PID 964 wrote to memory of 2180 964 hypercomCrtMonitor.exe 109 PID 964 wrote to memory of 2180 964 hypercomCrtMonitor.exe 109 PID 964 wrote to memory of 4584 964 hypercomCrtMonitor.exe 110 PID 964 wrote to memory of 4584 964 hypercomCrtMonitor.exe 110 PID 964 wrote to memory of 4440 964 hypercomCrtMonitor.exe 111 PID 964 wrote to memory of 4440 964 hypercomCrtMonitor.exe 111 PID 964 wrote to memory of 860 964 hypercomCrtMonitor.exe 112 PID 964 wrote to memory of 860 964 hypercomCrtMonitor.exe 112 PID 964 wrote to memory of 2448 964 hypercomCrtMonitor.exe 113 PID 964 wrote to memory of 2448 964 hypercomCrtMonitor.exe 113 PID 964 wrote to memory of 5020 964 hypercomCrtMonitor.exe 114 PID 964 wrote to memory of 5020 964 hypercomCrtMonitor.exe 114 PID 964 wrote to memory of 2844 964 hypercomCrtMonitor.exe 115 PID 964 wrote to memory of 2844 964 hypercomCrtMonitor.exe 115 PID 964 wrote to memory of 760 964 hypercomCrtMonitor.exe 116 PID 964 wrote to memory of 760 964 hypercomCrtMonitor.exe 116 PID 964 wrote to memory of 4828 964 hypercomCrtMonitor.exe 117 PID 964 wrote to memory of 4828 964 hypercomCrtMonitor.exe 117 PID 964 wrote to memory of 4728 964 hypercomCrtMonitor.exe 118 PID 964 wrote to memory of 4728 964 hypercomCrtMonitor.exe 118 PID 964 wrote to memory of 2608 964 hypercomCrtMonitor.exe 119 PID 964 wrote to memory of 2608 964 hypercomCrtMonitor.exe 119 PID 964 wrote to memory of 4232 964 hypercomCrtMonitor.exe 120 PID 964 wrote to memory of 4232 964 hypercomCrtMonitor.exe 120 PID 964 wrote to memory of 4868 964 hypercomCrtMonitor.exe 121 PID 964 wrote to memory of 4868 964 hypercomCrtMonitor.exe 121 PID 964 wrote to memory of 3076 964 hypercomCrtMonitor.exe 122 PID 964 wrote to memory of 3076 964 hypercomCrtMonitor.exe 122 PID 964 wrote to memory of 4404 964 hypercomCrtMonitor.exe 141 PID 964 wrote to memory of 4404 964 hypercomCrtMonitor.exe 141 PID 4404 wrote to memory of 908 4404 cmd.exe 143 PID 4404 wrote to memory of 908 4404 cmd.exe 143 PID 4404 wrote to memory of 2924 4404 cmd.exe 144 PID 4404 wrote to memory of 2924 4404 cmd.exe 144 PID 4404 wrote to memory of 540 4404 cmd.exe 145 PID 4404 wrote to memory of 540 4404 cmd.exe 145 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\incore.exe"C:\Users\Admin\AppData\Local\Temp\incore.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\fontCrtmonitor\3ZRHIxPIjsb.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\fontCrtmonitor\ggooOvvNMLFpJUHeJA7JSZJLf.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\fontCrtmonitor\hypercomCrtMonitor.exe"C:\fontCrtmonitor/hypercomCrtMonitor.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qln1hjg2\qln1hjg2.cmdline"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES149C.tmp" "c:\Windows\System32\CSC5F505F58D8A54FEFA01F43D21A4D228A.TMP"6⤵PID:320
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/fontCrtmonitor/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\unsecapp.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Defender\it-IT\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\Registry.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\fontCrtmonitor\hypercomCrtMonitor.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3076
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\H06cY0hL3V.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:908
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2924
-
-
C:\Program Files (x86)\Adobe\unsecapp.exe"C:\Program Files (x86)\Adobe\unsecapp.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Adobe\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Adobe\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Adobe\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Adobe\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\it-IT\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\it-IT\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\it-IT\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "hypercomCrtMonitorh" /sc MINUTE /mo 13 /tr "'C:\fontCrtmonitor\hypercomCrtMonitor.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "hypercomCrtMonitor" /sc ONLOGON /tr "'C:\fontCrtmonitor\hypercomCrtMonitor.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "hypercomCrtMonitorh" /sc MINUTE /mo 10 /tr "'C:\fontCrtmonitor\hypercomCrtMonitor.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:556
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5e8ce785f8ccc6d202d56fefc59764945
SHA1ca032c62ddc5e0f26d84eff9895eb87f14e15960
SHA256d85c19fc6b9d25e2168a2cc50ff38bd226fbf4f02aa7ac038a5f319522d2ffa4
SHA51266460aec4afee582556270f8ee6048d130a090f1c12a2632ed71a99a4073e9931e9e1cc286e32debffb95a90bd955f0f0d6ec891b1c5cd2f0aae41eb6d25832f
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
217B
MD5e49f26c6927dd2bd7b584b2b48137262
SHA138babbef4ed581a02867b912606f1bf6ce5b4648
SHA256d7de7bba87a949030842ad71dc431ef1f4adb93e7e4b8a898125aab49910f47f
SHA512ad7ddea7cf4f84441647abf6798e4e0c70ed47b64fe1d9c01b919d791a3168f6be4df283c8ad8cd937ac7795cdd05ee2991178a1ae2a6b53851ffebce0bc122f
-
Filesize
1KB
MD5f4d8653fec19712fbec8a9279c7277ee
SHA1f7cc104723f60fb711ef9d003bb42eb58311d202
SHA2569b715e67015ca5fdad1f69d6b377aba9162478620ac89e8f6a1424b2ff7c63dd
SHA512d7ef61a5c1fe1bc6497ef35067c393381590203493df857769b54a29b90493db1657a3d786851d2a006a5825942ee393637876d873108daf189d25b603a948fb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
218B
MD5623fc76c6ffa7386cf3ba5bd07316cd0
SHA1f35d0b54e393e8f9a0662d175e0e1895e47c6e05
SHA2562e5e3b082cf3350781210ee9c1d404fc3b530c182b22a3a4a05c7cd6b04f5b18
SHA512d44af88f6e249fb4cdc78c61db0f7020e1c9f98b0e5bb0c4ec2261ece646ef464c3a5b30df9e042da3112b8b3c8dc7f1f55ae54f3948dcd3f192cdd317f57125
-
Filesize
92B
MD53b890edc86e87609973d9d0dacbb0b0a
SHA194b43c89db0ed52658e8a76dc075c40d959d1e51
SHA25633c65a531e04e663ba8a9590080c1786330f6f98c32a7da57694f4df6f48aeac
SHA5125d3bf328910e66aa498b7c2b49e86a2e6eb71c7710c8aa4561dc121070c44bf62b40bd65227113decaa71080ee9b2a7f978f0648401580ce02d9e869619d889d
-
Filesize
1.8MB
MD52a6e3f3275d854bf07aba2427baa6610
SHA137d6411844b5d8a9d997f38f7718168b33cbc564
SHA2564aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b
SHA512a6054ab62fc7415dafaca1dc273b42edd9680541e964b7b20d6b7ed07d65fb2ee01ea833bfedec9abc3687814449bb65f7c041ba462aed5cc44397e0ae2d4ef0
-
Filesize
373B
MD5f065e4cd70d4e8ba573e29d94a6a7e8c
SHA1e3070f7a11a8442a41acd7702fca501452665b27
SHA2569bdd61971a36d392a11a522b4166a9b10e0fbd0d90bae6797e7f19da6e9df181
SHA51265708d99d8b9cea5a1194f0fa430fc4536d0832fb20abd6c1371d2b6e19cddf2171e1290d6859a128e25a4022cd3060d9e266311e3ee142e9019457777fd739c
-
Filesize
235B
MD5e5fdac5265ca59218121c599977bf1d4
SHA122bf30780ba2c6e08c29707de132807e81698c14
SHA2567feeed9bd05c262b361a8997d0dc0e86cb886011a128c1d348de7e13467789c0
SHA51291ecceeb9961077b94609260dd64d0758dc16dfd8460de984010e6017cd5d126cbc38a17da37cc5b21a7ee432aed67c11435c68d44fd0b4f6c6da9903ed96c9b
-
Filesize
1KB
MD511f4218b96ad3ecdc6d5714ccae88c34
SHA1aba1b8883276fc78b265064d8bd621e0059a605f
SHA256cec89464912874da932cea9462d651fb1ea9ddddd0bae1145bc897aa463a2988
SHA512d5dc1f7e756024849ac3b08d9f560225aa13ced2994a47feefc2dc4ee88e717ff0b48a301c0ce39d86e6a9cc84c66f52f28e865fe78ace59adc7ac797fe95889