Overview
overview
10Static
static
10d1773dbf85...14.exe
windows7-x64
10d1773dbf85...14.exe
windows10-2004-x64
10d17833b5ad...14.exe
windows7-x64
10d17833b5ad...14.exe
windows10-2004-x64
10d19713a05b...60.exe
windows7-x64
10d19713a05b...60.exe
windows10-2004-x64
10d1a0b78620...86.exe
windows7-x64
10d1a0b78620...86.exe
windows10-2004-x64
10d1a62cde3f...76.exe
windows7-x64
9d1a62cde3f...76.exe
windows10-2004-x64
9d1ae74abc0...a4.exe
windows7-x64
3d1ae74abc0...a4.exe
windows10-2004-x64
3d1b8645939...8c.exe
windows7-x64
10d1b8645939...8c.exe
windows10-2004-x64
10d1d65f62ac...0f.exe
windows7-x64
3d1d65f62ac...0f.exe
windows10-2004-x64
10d1ec8c3742...5d.exe
windows7-x64
10d1ec8c3742...5d.exe
windows10-2004-x64
10d21427a7a6...37.exe
windows7-x64
7d21427a7a6...37.exe
windows10-2004-x64
7d2181d9845...ce.exe
windows7-x64
1d2181d9845...ce.exe
windows10-2004-x64
1d22a2ed71b...4e.exe
windows7-x64
7d22a2ed71b...4e.exe
windows10-2004-x64
10d23977a7d2...dd.exe
windows7-x64
3d23977a7d2...dd.exe
windows10-2004-x64
10d27cca2711...26.exe
windows7-x64
10d27cca2711...26.exe
windows10-2004-x64
10d28eec4485...4b.exe
windows7-x64
7d28eec4485...4b.exe
windows10-2004-x64
7d2b881f205...1d.exe
windows7-x64
10d2b881f205...1d.exe
windows10-2004-x64
10Analysis
-
max time kernel
102s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
d1773dbf85d917eb86780278256b5314.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1773dbf85d917eb86780278256b5314.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
d17833b5ad52144ac94274f3623e730f247aec0b6cd5d8cea6e910c898bac914.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
d17833b5ad52144ac94274f3623e730f247aec0b6cd5d8cea6e910c898bac914.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
d19713a05b239bb9c15e350f22976c60.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
d19713a05b239bb9c15e350f22976c60.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
d1a0b78620011cdf2da572aca494dc7841cb4ca79d073b671d522434894ab086.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
d1a0b78620011cdf2da572aca494dc7841cb4ca79d073b671d522434894ab086.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral9
Sample
d1a62cde3f49e619203ecf47cdef2cb02a768451ece298279ccf098016885b76.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
d1a62cde3f49e619203ecf47cdef2cb02a768451ece298279ccf098016885b76.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
d1ae74abc0c8514f363c90e1a9b02aa4.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
d1ae74abc0c8514f363c90e1a9b02aa4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
d1b8645939d08182047951aa23291fa83dff7f397528319b6be11cb24885598c.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
d1b8645939d08182047951aa23291fa83dff7f397528319b6be11cb24885598c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
d1d65f62acce133f4e44c137020c260f.exe
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
d1d65f62acce133f4e44c137020c260f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
d1ec8c3742e4e01173d709df1353dc5d.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
d1ec8c3742e4e01173d709df1353dc5d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
d21427a7a658882f85cfc0f0494d2337.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
d21427a7a658882f85cfc0f0494d2337.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
d2181d98457190fa4bf7c49a700a5dfacba23a30d6377e5616aa9268c828dbce.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
d2181d98457190fa4bf7c49a700a5dfacba23a30d6377e5616aa9268c828dbce.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
d22a2ed71bc83120e890a0b31d49984e.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
d22a2ed71bc83120e890a0b31d49984e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
d23977a7d2d13a4481eabc68752bf8dd.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
d23977a7d2d13a4481eabc68752bf8dd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
d27cca271192c44b146218aa9a2e4926.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
d27cca271192c44b146218aa9a2e4926.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
d28eec44852da7258b49d5816a13e6fbb31a34b744a327656950df56f3fef14b.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
d28eec44852da7258b49d5816a13e6fbb31a34b744a327656950df56f3fef14b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe
Resource
win10v2004-20250314-en
General
-
Target
d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe
-
Size
999KB
-
MD5
7c3748401169a78459eb9603ff69e2b2
-
SHA1
1a5d82422f062f1ce5d6eb3cb41c56d066f7981f
-
SHA256
d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d
-
SHA512
ec52f803bd6ff1fbcec6da1624a5fb93ebba87742fd3191b27fdf8e77bc7cbc8217542eacffb1f1f2c323a3956ef3037ef47595c9a00e43951172171275abc12
-
SSDEEP
12288:/9pLLk45WSSY1BX6f4bIS7rMNetPfC9Vs6IFGs0jxAqXj9xPSI0dzNgCoD7WX+Iu:/9pP5WS3lrMNyC9TJPCXBi
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\Registry.exe\", \"C:\\Windows\\Help\\Windows\\IndexStore\\en-US\\dwm.exe\", \"C:\\Windows\\en-US\\smss.exe\", \"C:\\ProgramData\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\updates\\explorer.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Users\\Public\\Documents\\My Music\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Microsoft Office\\PackageManifests\\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe\", \"C:\\Users\\Admin\\taskhostw.exe\", \"C:\\ProgramData\\Documents\\fontdrvhost.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\Registry.exe\", \"C:\\Windows\\Help\\Windows\\IndexStore\\en-US\\dwm.exe\", \"C:\\Windows\\en-US\\smss.exe\", \"C:\\ProgramData\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\updates\\explorer.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Users\\Public\\Documents\\My Music\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Microsoft Office\\PackageManifests\\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe\", \"C:\\Users\\Admin\\taskhostw.exe\", \"C:\\ProgramData\\Documents\\fontdrvhost.exe\", \"C:\\Users\\Public\\Videos\\RuntimeBroker.exe\", \"C:\\ProgramData\\Microsoft OneDrive\\setup\\SppExtComObj.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\dllhost.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\Registry.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\Registry.exe\", \"C:\\Windows\\Help\\Windows\\IndexStore\\en-US\\dwm.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\Registry.exe\", \"C:\\Windows\\Help\\Windows\\IndexStore\\en-US\\dwm.exe\", \"C:\\Windows\\en-US\\smss.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\Registry.exe\", \"C:\\Windows\\Help\\Windows\\IndexStore\\en-US\\dwm.exe\", \"C:\\Windows\\en-US\\smss.exe\", \"C:\\ProgramData\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\updates\\explorer.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\Registry.exe\", \"C:\\Windows\\Help\\Windows\\IndexStore\\en-US\\dwm.exe\", \"C:\\Windows\\en-US\\smss.exe\", \"C:\\ProgramData\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\updates\\explorer.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\Registry.exe\", \"C:\\Windows\\Help\\Windows\\IndexStore\\en-US\\dwm.exe\", \"C:\\Windows\\en-US\\smss.exe\", \"C:\\ProgramData\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\updates\\explorer.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Users\\Public\\Documents\\My Music\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Microsoft Office\\PackageManifests\\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe\", \"C:\\Users\\Admin\\taskhostw.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\Registry.exe\", \"C:\\Windows\\Help\\Windows\\IndexStore\\en-US\\dwm.exe\", \"C:\\Windows\\en-US\\smss.exe\", \"C:\\ProgramData\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\updates\\explorer.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Users\\Public\\Documents\\My Music\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Microsoft Office\\PackageManifests\\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe\", \"C:\\Users\\Admin\\taskhostw.exe\", \"C:\\ProgramData\\Documents\\fontdrvhost.exe\", \"C:\\Users\\Public\\Videos\\RuntimeBroker.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\Registry.exe\", \"C:\\Windows\\Help\\Windows\\IndexStore\\en-US\\dwm.exe\", \"C:\\Windows\\en-US\\smss.exe\", \"C:\\ProgramData\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\updates\\explorer.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Users\\Public\\Documents\\My Music\\StartMenuExperienceHost.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\Registry.exe\", \"C:\\Windows\\Help\\Windows\\IndexStore\\en-US\\dwm.exe\", \"C:\\Windows\\en-US\\smss.exe\", \"C:\\ProgramData\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\updates\\explorer.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Users\\Public\\Documents\\My Music\\StartMenuExperienceHost.exe\", \"C:\\Program Files\\Microsoft Office\\PackageManifests\\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe -
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4768 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4764 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5720 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4748 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4824 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4692 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4020 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5032 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4740 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3896 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 368 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3576 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4668 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4888 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4960 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4032 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4980 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4976 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5008 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4872 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4192 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1012 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3440 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1300 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1528 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4944 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3108 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5792 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5732 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3208 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1672 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2040 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1260 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5252 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3692 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2852 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1384 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3744 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5292 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 636 4044 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 232 4044 schtasks.exe 88 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe -
Executes dropped EXE 1 IoCs
pid Process 4652 taskhostw.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\Help\\Windows\\IndexStore\\en-US\\dwm.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\ProgramData\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\updates\\explorer.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\debug\\backgroundTaskHost.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Users\\Public\\Documents\\My Music\\StartMenuExperienceHost.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Users\\Admin\\taskhostw.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\ProgramData\\Documents\\fontdrvhost.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\en-US\\smss.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d = "\"C:\\Program Files\\Microsoft Office\\PackageManifests\\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Users\\Public\\Videos\\RuntimeBroker.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\ProgramData\\Microsoft OneDrive\\setup\\SppExtComObj.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\WindowsRE\\dllhost.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\Registry.exe\"" d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\PackageManifests\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File created C:\Program Files\Microsoft Office\PackageManifests\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File created C:\Program Files\Microsoft Office\PackageManifests\9f171e4e11a5db d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\RCX9328.tmp d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\RCX93A6.tmp d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\en-US\RCX890E.tmp d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File created C:\Windows\Help\Windows\IndexStore\en-US\dwm.exe d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File created C:\Windows\debug\backgroundTaskHost.exe d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File opened for modification C:\Windows\Help\Windows\IndexStore\en-US\RCX86E9.tmp d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File opened for modification C:\Windows\en-US\smss.exe d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File opened for modification C:\Windows\debug\RCX8E13.tmp d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File created C:\Windows\en-US\smss.exe d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File created C:\Windows\debug\eddb19405b7ce1 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File opened for modification C:\Windows\Help\Windows\IndexStore\en-US\dwm.exe d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File opened for modification C:\Windows\en-US\RCX898C.tmp d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File opened for modification C:\Windows\debug\RCX8E82.tmp d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File opened for modification C:\Windows\debug\backgroundTaskHost.exe d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File created C:\Windows\Help\Windows\IndexStore\en-US\6cb0b6c459d5d3 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File opened for modification C:\Windows\Help\Windows\IndexStore\en-US\RCX86EA.tmp d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe File created C:\Windows\en-US\69ddcba757bf72 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4692 schtasks.exe 4032 schtasks.exe 5008 schtasks.exe 1300 schtasks.exe 5732 schtasks.exe 1672 schtasks.exe 2760 schtasks.exe 3060 schtasks.exe 4748 schtasks.exe 5032 schtasks.exe 4740 schtasks.exe 1528 schtasks.exe 1260 schtasks.exe 2852 schtasks.exe 3744 schtasks.exe 5292 schtasks.exe 4768 schtasks.exe 3896 schtasks.exe 4888 schtasks.exe 4960 schtasks.exe 1060 schtasks.exe 1012 schtasks.exe 4944 schtasks.exe 3576 schtasks.exe 4668 schtasks.exe 4764 schtasks.exe 2104 schtasks.exe 4192 schtasks.exe 1664 schtasks.exe 4976 schtasks.exe 5792 schtasks.exe 1888 schtasks.exe 232 schtasks.exe 368 schtasks.exe 5720 schtasks.exe 4980 schtasks.exe 4872 schtasks.exe 3208 schtasks.exe 1384 schtasks.exe 636 schtasks.exe 2040 schtasks.exe 3692 schtasks.exe 3440 schtasks.exe 4824 schtasks.exe 4020 schtasks.exe 3108 schtasks.exe 5252 schtasks.exe 2508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe Token: SeDebugPrivilege 4652 taskhostw.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1840 wrote to memory of 5064 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 143 PID 1840 wrote to memory of 5064 1840 d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe 143 PID 5064 wrote to memory of 996 5064 cmd.exe 145 PID 5064 wrote to memory of 996 5064 cmd.exe 145 PID 5064 wrote to memory of 4652 5064 cmd.exe 151 PID 5064 wrote to memory of 4652 5064 cmd.exe 151 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe"C:\Users\Admin\AppData\Local\Temp\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CyA6Uc1OxI.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:996
-
-
C:\Users\Admin\taskhostw.exe"C:\Users\Admin\taskhostw.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONSTART /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc MINUTE /mo 9 /tr "'C:\ProgramData\WindowsHolographicDevices\SpatialStore\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\ProgramData\WindowsHolographicDevices\SpatialStore\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONSTART /tr "'C:\ProgramData\WindowsHolographicDevices\SpatialStore\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\ProgramData\WindowsHolographicDevices\SpatialStore\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc MINUTE /mo 7 /tr "'C:\Windows\Help\Windows\IndexStore\en-US\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\Help\Windows\IndexStore\en-US\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONSTART /tr "'C:\Windows\Help\Windows\IndexStore\en-US\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Windows\Help\Windows\IndexStore\en-US\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc MINUTE /mo 10 /tr "'C:\Windows\en-US\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\en-US\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONSTART /tr "'C:\Windows\en-US\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Windows\en-US\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc MINUTE /mo 8 /tr "'C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\updates\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\updates\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONSTART /tr "'C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\updates\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\updates\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc MINUTE /mo 14 /tr "'C:\Windows\debug\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\debug\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONSTART /tr "'C:\Windows\debug\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 13 /tr "'C:\Windows\debug\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc MINUTE /mo 8 /tr "'C:\Users\Public\Documents\My Music\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\Public\Documents\My Music\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONSTART /tr "'C:\Users\Public\Documents\My Music\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Documents\My Music\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d" /sc MINUTE /mo 14 /tr "'C:\Program Files\Microsoft Office\PackageManifests\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\PackageManifests\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d" /sc ONSTART /tr "'C:\Program Files\Microsoft Office\PackageManifests\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1dd" /sc MINUTE /mo 14 /tr "'C:\Program Files\Microsoft Office\PackageManifests\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Admin\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONSTART /tr "'C:\Users\Admin\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc MINUTE /mo 13 /tr "'C:\ProgramData\Documents\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\ProgramData\Documents\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONSTART /tr "'C:\ProgramData\Documents\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\ProgramData\Documents\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Videos\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Public\Videos\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONSTART /tr "'C:\Users\Public\Videos\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Videos\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc MINUTE /mo 12 /tr "'C:\ProgramData\Microsoft OneDrive\setup\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\ProgramData\Microsoft OneDrive\setup\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONSTART /tr "'C:\ProgramData\Microsoft OneDrive\setup\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\ProgramData\Microsoft OneDrive\setup\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\PackageManifests\d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d.exe
Filesize999KB
MD5b29609dd11d191566a2bb046f39b44d3
SHA143d4b008935dd314838c2dc7892332e02a2b8208
SHA2567f32fc4a218cb09906a7a23c10c8e698a9cc0c322b94eb67f8f964b1cb1dd6fe
SHA5128176a63ace3bcd98dc5507d1e5e5d113e887716f5e2476d1f604e48e435e58accade1201d2823a5fbf56e4b16b9e752d834c6155ddcf0f2c92998f41ac2d5fed
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\updates\explorer.exe
Filesize999KB
MD57c3748401169a78459eb9603ff69e2b2
SHA11a5d82422f062f1ce5d6eb3cb41c56d066f7981f
SHA256d2b881f2057c461af88b09179c137e9cf316304860ffe392700d143a4082fb1d
SHA512ec52f803bd6ff1fbcec6da1624a5fb93ebba87742fd3191b27fdf8e77bc7cbc8217542eacffb1f1f2c323a3956ef3037ef47595c9a00e43951172171275abc12
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\updates\explorer.exe
Filesize999KB
MD5204f10e085ee403f0c94abb643dc4e20
SHA167795b42fa3baf927915c22ce489cc3eb2ce2e39
SHA256f2ae3cb87bcc8341df4922002c610657ee335f5b031be9978652e7cbeb2e9747
SHA5122db1dcb34a8a0091145c8347ca9da68fe67847913011155082a618b1a4d6756ceaf3a9e130b64f25d2c6e7ce49bf3aae9851dcae3196f959537e2a2264298244
-
Filesize
192B
MD5bcdbdfc60a9c26e616b4908d1ea3b625
SHA1295ec37fcfcf7b0f759eee24c33856a53368bf90
SHA256bf4fa7f2b884006049a625c78af6a5db6396111851b1e9da16e082be908916fa
SHA512f5ba2a10c6ef020140384c3c74f45dd7e81cda1b3791b8f89b41508066158bd6678941b9e5339b3955bcc68ddc1efb2feffd5aaf06cf09f663f40f20af17e58b
-
Filesize
999KB
MD5a73b1dd144ac564f13d4f2bd2e0eac84
SHA1ad14f219bd41da2998b435ac1a555afb04bf700f
SHA256946e123db8541f40bcdc2adf6b3804679ccc1ba46426ac970f54a3713d9b0b58
SHA512a0c3d0b7cb901d363ade63a3758dce20836bb60ffe4dfea154577a09c76b60261ce92f3681ad6487dfb586fb71cbefd5773221a2e63f21742e612d9f481ebb06
-
Filesize
999KB
MD55c8efcbd0634139ad025345a909d0e89
SHA17ce70ed85f7fcfcde5e0203ef4cf398147c6cf15
SHA256f6e44a3af56011de296d051ce317b365087f37444082addd9f132233e590e945
SHA512b4a9eec5ba16b9a2bee1ebc80b03f5bfa47a14ca129f94f37bf0de318d2dcdc7232601b204cec0072f38046b6e1b661b08b005c35083a23b0e57bc5feeea98e9