Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2025 23:31
Behavioral task
behavioral1
Sample
0215f663fdd517dfaf504dde88033d11.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0215f663fdd517dfaf504dde88033d11.exe
Resource
win10v2004-20250207-en
General
-
Target
0215f663fdd517dfaf504dde88033d11.exe
-
Size
2.6MB
-
MD5
0215f663fdd517dfaf504dde88033d11
-
SHA1
0ded73fec09ecb866568a5d3cf4bd442b0d8d554
-
SHA256
a51d05aad64836fbca131477091f1a0ad80d1759387af35adc3861f9e0ac96cf
-
SHA512
a308332b346bcc91f105bcea3df2e811f3429425ec1675fdbc05ede95c2faba173f47404746ea3a8ec690e9c8ebf2a53fc2f748a4d58e9c448f9be3f35edab5d
-
SSDEEP
49152:UbA305FwUvjxmrQaS68AOKauPwpisvLwl0SnW+7dzz:UbP5xmqADFgisvkl0SnWi1z
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4856 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2076 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3092 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2936 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5052 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4500 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3824 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4304 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4848 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1840 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4360 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4060 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 624 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4140 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3140 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3132 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 924 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4416 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4980 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 928 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3752 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3680 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4508 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1416 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1112 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4928 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5064 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4672 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 748 3468 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2368 3468 schtasks.exe 95 -
resource yara_rule behavioral2/files/0x0007000000023e2a-15.dat dcrat behavioral2/memory/4288-17-0x0000000000DD0000-0x0000000001022000-memory.dmp dcrat -
Downloads MZ/PE file 1 IoCs
flow pid Process 50 3500 Process not Found -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation 0215f663fdd517dfaf504dde88033d11.exe Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation SurrogateRuntimeDhcp.exe -
Executes dropped EXE 2 IoCs
pid Process 4288 SurrogateRuntimeDhcp.exe 556 System.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Multimedia Platform\29c1c3cc0f7685 SurrogateRuntimeDhcp.exe File created C:\Program Files\Windows Photo Viewer\csrss.exe SurrogateRuntimeDhcp.exe File created C:\Program Files\Windows Photo Viewer\886983d96e3d3e SurrogateRuntimeDhcp.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\9e8d7a4ca61bd9 SurrogateRuntimeDhcp.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\22eafd247d37c3 SurrogateRuntimeDhcp.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\RuntimeBroker.exe SurrogateRuntimeDhcp.exe File created C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe SurrogateRuntimeDhcp.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\fontdrvhost.exe SurrogateRuntimeDhcp.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\5b884080fd4f94 SurrogateRuntimeDhcp.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\TextInputHost.exe SurrogateRuntimeDhcp.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\uk-UA\dllhost.exe SurrogateRuntimeDhcp.exe File created C:\Windows\uk-UA\5940a34987c991 SurrogateRuntimeDhcp.exe File created C:\Windows\SystemResources\Windows.UI.PrintDialog\SppExtComObj.exe SurrogateRuntimeDhcp.exe File created C:\Windows\SystemResources\Windows.UI.PrintDialog\e1ef82546f0b02 SurrogateRuntimeDhcp.exe File created C:\Windows\LiveKernelReports\taskhostw.exe SurrogateRuntimeDhcp.exe File created C:\Windows\LiveKernelReports\ea9f0e6c9e2dcd SurrogateRuntimeDhcp.exe File created C:\Windows\rescache\_merged\4245263321\SurrogateRuntimeDhcp.exe SurrogateRuntimeDhcp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0215f663fdd517dfaf504dde88033d11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1128 MicrosoftEdgeUpdate.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000_Classes\Local Settings 0215f663fdd517dfaf504dde88033d11.exe Key created \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000_Classes\Local Settings SurrogateRuntimeDhcp.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3140 schtasks.exe 2324 schtasks.exe 4856 schtasks.exe 5052 schtasks.exe 4848 schtasks.exe 624 schtasks.exe 4980 schtasks.exe 928 schtasks.exe 1416 schtasks.exe 1112 schtasks.exe 2076 schtasks.exe 4500 schtasks.exe 4928 schtasks.exe 748 schtasks.exe 4508 schtasks.exe 2552 schtasks.exe 1904 schtasks.exe 2368 schtasks.exe 1840 schtasks.exe 4140 schtasks.exe 4360 schtasks.exe 4060 schtasks.exe 924 schtasks.exe 2656 schtasks.exe 4672 schtasks.exe 3092 schtasks.exe 4304 schtasks.exe 5064 schtasks.exe 3752 schtasks.exe 3824 schtasks.exe 3132 schtasks.exe 1724 schtasks.exe 2936 schtasks.exe 2220 schtasks.exe 4416 schtasks.exe 3680 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4288 SurrogateRuntimeDhcp.exe 4288 SurrogateRuntimeDhcp.exe 4288 SurrogateRuntimeDhcp.exe 4288 SurrogateRuntimeDhcp.exe 4288 SurrogateRuntimeDhcp.exe 4288 SurrogateRuntimeDhcp.exe 4288 SurrogateRuntimeDhcp.exe 4288 SurrogateRuntimeDhcp.exe 4288 SurrogateRuntimeDhcp.exe 4288 SurrogateRuntimeDhcp.exe 556 System.exe 556 System.exe 556 System.exe 556 System.exe 556 System.exe 556 System.exe 556 System.exe 556 System.exe 556 System.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4288 SurrogateRuntimeDhcp.exe Token: SeDebugPrivilege 556 System.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4460 wrote to memory of 4896 4460 0215f663fdd517dfaf504dde88033d11.exe 89 PID 4460 wrote to memory of 4896 4460 0215f663fdd517dfaf504dde88033d11.exe 89 PID 4460 wrote to memory of 4896 4460 0215f663fdd517dfaf504dde88033d11.exe 89 PID 4460 wrote to memory of 4324 4460 0215f663fdd517dfaf504dde88033d11.exe 90 PID 4460 wrote to memory of 4324 4460 0215f663fdd517dfaf504dde88033d11.exe 90 PID 4460 wrote to memory of 4324 4460 0215f663fdd517dfaf504dde88033d11.exe 90 PID 4896 wrote to memory of 3388 4896 WScript.exe 92 PID 4896 wrote to memory of 3388 4896 WScript.exe 92 PID 4896 wrote to memory of 3388 4896 WScript.exe 92 PID 3388 wrote to memory of 4288 3388 cmd.exe 94 PID 3388 wrote to memory of 4288 3388 cmd.exe 94 PID 4288 wrote to memory of 3988 4288 SurrogateRuntimeDhcp.exe 132 PID 4288 wrote to memory of 3988 4288 SurrogateRuntimeDhcp.exe 132 PID 3988 wrote to memory of 440 3988 cmd.exe 134 PID 3988 wrote to memory of 440 3988 cmd.exe 134 PID 3988 wrote to memory of 556 3988 cmd.exe 135 PID 3988 wrote to memory of 556 3988 cmd.exe 135 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0215f663fdd517dfaf504dde88033d11.exe"C:\Users\Admin\AppData\Local\Temp\0215f663fdd517dfaf504dde88033d11.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\blockcrtDhcpsvc\2xJOunBeqsksOaT.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\blockcrtDhcpsvc\XlkXAEn9WS1q1veIwKRegD4l.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\blockcrtDhcpsvc\SurrogateRuntimeDhcp.exe"C:\blockcrtDhcpsvc\SurrogateRuntimeDhcp.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wjGmuMCeVY.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:440
-
-
C:\Recovery\WindowsRE\System.exe"C:\Recovery\WindowsRE\System.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\blockcrtDhcpsvc\file.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:4324
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\All Users\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\uk-UA\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\uk-UA\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\uk-UA\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Windows\SystemResources\Windows.UI.PrintDialog\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\SystemResources\Windows.UI.PrintDialog\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 13 /tr "'C:\Windows\SystemResources\Windows.UI.PrintDialog\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Windows\LiveKernelReports\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\LiveKernelReports\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\Windows\LiveKernelReports\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Photo Viewer\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Photo Viewer\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\blockcrtDhcpsvc\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\blockcrtDhcpsvc\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\blockcrtDhcpsvc\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\Default User\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2368
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDU2MDgzODE5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197B
MD58ba9459fe1f3e8a07ed0d114b85f98a1
SHA1e01e4fa68441cd0c97e9916408c6330d5d79a5ac
SHA256e658ea43085c619e2749df4414833b9e14e6baf420d0c7e9b7407cb7429dc2d3
SHA512278af67ee8200b588a603f3012c5a327843c5ba04744f4688433bb5ba68e2625b430204703ecf6f8eb7d69293bc88393dc674a269b5f08c451e947808c8b5d6e
-
Filesize
216B
MD5cd4a9a122c8e25eb6c4c87a5161d53e1
SHA157540f5425699986a7d6ac0634aead67ae08b112
SHA2564a5f8647704f068f55a56482bcfdbd120686b6bd83300eba0a6eb1ce4d853829
SHA5129e648dba3915c653603b228e5a6a333819a04d1825a4dc5996aec5f6934d69cb2c9e4dfbbd344da98466954069ecf03598a3082240627b1d073c3d57b88476cc
-
Filesize
2.3MB
MD52a8ad34794f32891cb2fc388ddc9c527
SHA1005e084b70ab69116d22b497ca6bbd8c353ae202
SHA25626ec76f958a7692cb0628e3ae232da71526de934999a8cd23a3cc5c375f58414
SHA5120c81c95d89d0ae7f7ebdf2a4740e78421f4b9248c07c8c572ff625e9bc479d6f79d8b8d16d7c0e18c6565934d61a301a55daa022f1459995c909e76fd6d05c3a
-
Filesize
45B
MD5404d63ccb6589c8939a8441cf0bccecd
SHA1847fdfd6734bd11bdcfe0c894c0c75beb20eb633
SHA256b369d63f0ef7027277dd53e8aacce27b194c1c7c2ca269740a63534e1ed00399
SHA51250e46c18e4f91d0fffd55e613c75eff4ae342303bf14f319955e1ce6fa96e1b4207c4490a108e9218a80e7303a2f827b7c5119014232c8615f371ae888fb1422
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a