Analysis
-
max time kernel
109s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2025 10:35
Behavioral task
behavioral1
Sample
c96194c7bf528b7c7ecf526ee3578041.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c96194c7bf528b7c7ecf526ee3578041.exe
Resource
win10v2004-20250207-en
General
-
Target
c96194c7bf528b7c7ecf526ee3578041.exe
-
Size
2.7MB
-
MD5
c96194c7bf528b7c7ecf526ee3578041
-
SHA1
0b082445d2c454387834413396c6c557ff52e2d2
-
SHA256
c3627f7a85532ddd721bc37ed3816ff0197641ff368ed20bd39c19aabeeb97db
-
SHA512
c74679eff4c233d38697510932021bd9090deb4a59802347fbe30ce79305423600b5706cc8db4fc2cb203041575dc19753770fdf114a54505593eb7873c442af
-
SSDEEP
49152:3jgByCva+AtOYESlRp3bBKelCRxlOiOYl74sYe4IDhUdK7oIgSOrREmUGs:4q0SlRBdJ2xQO7t4IDhF7oInixU
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 39 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3580 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4588 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1568 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1872 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4332 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3492 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4428 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3284 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2716 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3164 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4988 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4996 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3508 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4412 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1512 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1868 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1240 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3260 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3936 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1168 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3980 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 560 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1484 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1324 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1396 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1772 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4508 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5116 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3932 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 724 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3388 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3152 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 692 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1900 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3648 3912 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 3912 schtasks.exe 89 -
UAC bypass 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c96194c7bf528b7c7ecf526ee3578041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" c96194c7bf528b7c7ecf526ee3578041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" c96194c7bf528b7c7ecf526ee3578041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sysmon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" sysmon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" sysmon.exe -
resource yara_rule behavioral2/memory/2052-1-0x0000000000D10000-0x0000000000FC4000-memory.dmp dcrat behavioral2/files/0x0008000000023d79-30.dat dcrat behavioral2/files/0x0009000000023dd1-64.dat dcrat behavioral2/files/0x0008000000023dd2-84.dat dcrat behavioral2/files/0x000c000000023d79-146.dat dcrat behavioral2/files/0x000b000000023db1-164.dat dcrat behavioral2/files/0x0009000000023db9-176.dat dcrat behavioral2/files/0x000a000000023db7-181.dat dcrat -
Downloads MZ/PE file 1 IoCs
flow pid Process 45 3224 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2499155680-3253481302-763015360-1000\Control Panel\International\Geo\Nation c96194c7bf528b7c7ecf526ee3578041.exe -
Executes dropped EXE 1 IoCs
pid Process 1416 sysmon.exe -
Checks whether UAC is enabled 1 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c96194c7bf528b7c7ecf526ee3578041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c96194c7bf528b7c7ecf526ee3578041.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sysmon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sysmon.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File created C:\Program Files\Windows Multimedia Platform\ee2ad38f3d4382 c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\RCXAD32.tmp c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\RCXAD33.tmp c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Program Files (x86)\MSBuild\RCXB692.tmp c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Program Files\Windows Multimedia Platform\Registry.exe c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Program Files (x86)\Windows Photo Viewer\de-DE\sppsvc.exe c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Program Files (x86)\MSBuild\sysmon.exe c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Program Files\Windows Multimedia Platform\Registry.exe c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_2019.716.2316.0_neutral_~_8wekyb3d8bbwe\System.exe c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Program Files (x86)\Windows Photo Viewer\de-DE\0a1fd5f707cd16 c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Program Files\Windows Multimedia Platform\RCXBBD5.tmp c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Program Files (x86)\MSBuild\sysmon.exe c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\27d1bcfc3c54e0 c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Program Files (x86)\MSBuild\121e5b5079f7c0 c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\sppsvc.exe c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\System.exe c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Program Files (x86)\MSBuild\RCXB662.tmp c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Program Files\Windows Multimedia Platform\RCXBB57.tmp c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\System.exe c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\RCXB3DF.tmp c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\RCXB45D.tmp c96194c7bf528b7c7ecf526ee3578041.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\IME\RCXB1CB.tmp c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Windows\Setup\State\RCXB914.tmp c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Windows\Provisioning\RCXC01F.tmp c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Windows\Provisioning\fontdrvhost.exe c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Windows\Setup\State\OfficeClickToRun.exe c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Windows\Setup\State\e6c9b481da804f c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Windows\Provisioning\5b884080fd4f94 c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Windows\Setup\State\OfficeClickToRun.exe c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Windows\Provisioning\RCXC01E.tmp c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Windows\Setup\State\RCXB896.tmp c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Windows\IME\StartMenuExperienceHost.exe c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Windows\IME\55b276f4edf653 c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Windows\IME\RCXB1CA.tmp c96194c7bf528b7c7ecf526ee3578041.exe File created C:\Windows\Provisioning\fontdrvhost.exe c96194c7bf528b7c7ecf526ee3578041.exe File opened for modification C:\Windows\IME\StartMenuExperienceHost.exe c96194c7bf528b7c7ecf526ee3578041.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5016 MicrosoftEdgeUpdate.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c96194c7bf528b7c7ecf526ee3578041.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 39 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4508 schtasks.exe 5116 schtasks.exe 3284 schtasks.exe 2996 schtasks.exe 3936 schtasks.exe 1772 schtasks.exe 1240 schtasks.exe 1324 schtasks.exe 1396 schtasks.exe 1900 schtasks.exe 4588 schtasks.exe 4332 schtasks.exe 3388 schtasks.exe 692 schtasks.exe 3648 schtasks.exe 3508 schtasks.exe 3260 schtasks.exe 560 schtasks.exe 1484 schtasks.exe 1568 schtasks.exe 1872 schtasks.exe 3164 schtasks.exe 3152 schtasks.exe 3932 schtasks.exe 3580 schtasks.exe 4428 schtasks.exe 2700 schtasks.exe 4412 schtasks.exe 1512 schtasks.exe 1168 schtasks.exe 2976 schtasks.exe 3492 schtasks.exe 2716 schtasks.exe 4988 schtasks.exe 4996 schtasks.exe 1660 schtasks.exe 1868 schtasks.exe 3980 schtasks.exe 724 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2052 c96194c7bf528b7c7ecf526ee3578041.exe 2052 c96194c7bf528b7c7ecf526ee3578041.exe 2052 c96194c7bf528b7c7ecf526ee3578041.exe 2052 c96194c7bf528b7c7ecf526ee3578041.exe 2052 c96194c7bf528b7c7ecf526ee3578041.exe 2052 c96194c7bf528b7c7ecf526ee3578041.exe 2052 c96194c7bf528b7c7ecf526ee3578041.exe 1416 sysmon.exe 1416 sysmon.exe 1416 sysmon.exe 1416 sysmon.exe 1416 sysmon.exe 1416 sysmon.exe 1416 sysmon.exe 1416 sysmon.exe 1416 sysmon.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1416 sysmon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2052 c96194c7bf528b7c7ecf526ee3578041.exe Token: SeDebugPrivilege 1416 sysmon.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1416 2052 c96194c7bf528b7c7ecf526ee3578041.exe 129 PID 2052 wrote to memory of 1416 2052 c96194c7bf528b7c7ecf526ee3578041.exe 129 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c96194c7bf528b7c7ecf526ee3578041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" c96194c7bf528b7c7ecf526ee3578041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" c96194c7bf528b7c7ecf526ee3578041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sysmon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" sysmon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" sysmon.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c96194c7bf528b7c7ecf526ee3578041.exe"C:\Users\Admin\AppData\Local\Temp\c96194c7bf528b7c7ecf526ee3578041.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2052 -
C:\Program Files (x86)\MSBuild\sysmon.exe"C:\Program Files (x86)\MSBuild\sysmon.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1416
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Videos\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Public\Videos\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Videos\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Templates\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Admin\Templates\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Templates\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 12 /tr "'C:\Windows\IME\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\IME\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 12 /tr "'C:\Windows\IME\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\MSBuild\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 12 /tr "'C:\Windows\Setup\State\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\Setup\State\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Windows\Setup\State\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Multimedia Platform\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Multimedia Platform\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Windows\Provisioning\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Provisioning\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Windows\Provisioning\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2976
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDQ0OTciIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxNjkzODEzMjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjYwMzcxNDMwIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5016
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5c96194c7bf528b7c7ecf526ee3578041
SHA10b082445d2c454387834413396c6c557ff52e2d2
SHA256c3627f7a85532ddd721bc37ed3816ff0197641ff368ed20bd39c19aabeeb97db
SHA512c74679eff4c233d38697510932021bd9090deb4a59802347fbe30ce79305423600b5706cc8db4fc2cb203041575dc19753770fdf114a54505593eb7873c442af
-
Filesize
2.7MB
MD5da516ff4e04ebe5ab72bf949d69b9536
SHA163b35971e0267789bdfdec6fdd7bad2c7f9c265b
SHA256d47a4eb8d94976524b25a216d6fede282f2361f37bc4ed84aa78acb7c9e4efac
SHA5124f56976dcff1a0ebeb3d235f06bb9c1027a4aed11081191e76c8c2267f84b053b0ec5825bfdca1d3b33baf3878cca29c3808b5ad3424d0668e2c622f69f53ea7
-
Filesize
2.7MB
MD540f0b0f021550c023db74ff142625343
SHA13cdf24b5b3ecb9e9218f4fb36461cae4b362bb6c
SHA2562d861cc9b62aa721d7efe06fbaa470f473d652bcc0c5f47a0ae5354b2000adce
SHA512899708dff73cb0aae29fce1f3b17cddead4dd8a3d86e9ad116ce553b6c6cb9fdb436cd179248773303bcec5160927383e8585ed67ce46ae1ef0331610e143ca9
-
Filesize
2.7MB
MD5fc51525d69215b0947e292689d645e4c
SHA12539685ae8a9c5eeb1201cf467aa624179e720db
SHA256e1507ead89d481ef0bfa38e50e2a815aabbf74014dce7a7e7965d68542f5a5f6
SHA512a750d643f296de941550b4a89ae2e26f56db815d156c9a94f2bca7d93c75e0f32e1b65afbd5b9d610a7f88b9711a91b34217a13cfdecde6d480d1fc3fa81b259
-
Filesize
2.7MB
MD54beb4f3eb78ca8d4ae39720f88febc0e
SHA14ff35b7595593de926586db95e062a48c6eb211d
SHA2561515e8b7e5cf26c99bfe6a197458e46c7773863a52564bf0e07ba763c8938d97
SHA5129e8a51bc93662d836bb6d73ea10cf8039224ea5d615b98f027e309f938ff18dfb9bb2009f1db95c39c4c881af229751bf5b0b76fc1e94ef7f303cf89c9fc5d34
-
Filesize
2.7MB
MD58af76fd94d2ee1a1ffa1560d23fe3315
SHA1a2e99fa90cb050e5445bd4480529df6f57a3ffa0
SHA25698a6bda216ca432a43f66338e6dd5b90d7245379f6ecc0d6b7388f4e1583005a
SHA512db95b969bb6b5f1fcaddde2490d28fb598b5ef9994e44af6489fff1a16306f19b90187dc7e1f5bc833e571dc73df8b31cc3c555145dd86c3ee3b38396fa525e2
-
Filesize
2.7MB
MD503bfe7b30772d438b9a6efa6153685a0
SHA158c50e4185356906e320cfd3b2cdd5a81d068bbc
SHA2568e7bf76d9ea202a03cf7770d14e27dbacb1d1ae164733337dcbd1b80d9e6f482
SHA512667196a12248f66b237a27bffdd24a5fcd739f3570757f6515e34c2e5ac923d856acdcad36c534569869932073db3b24106ab4534864aed22aef5c126bb721d9