Overview
overview
10Static
static
10fe25de503f...5a.exe
windows7-x64
10fe25de503f...5a.exe
windows10-2004-x64
10fe282eaa90...45.exe
windows7-x64
10fe282eaa90...45.exe
windows10-2004-x64
10fe402f76d3...4d.exe
windows7-x64
10fe402f76d3...4d.exe
windows10-2004-x64
10fe55574c53...c0.exe
windows7-x64
1fe55574c53...c0.exe
windows10-2004-x64
5fe8a65a43d...3f.exe
windows7-x64
7fe8a65a43d...3f.exe
windows10-2004-x64
7fe99ddfdfc...6c.exe
windows7-x64
10fe99ddfdfc...6c.exe
windows10-2004-x64
10feb2c82a66...50.exe
windows7-x64
10feb2c82a66...50.exe
windows10-2004-x64
10fef2b831e5...91.exe
windows7-x64
8fef2b831e5...91.exe
windows10-2004-x64
8ff03c0c01a...cd.exe
windows7-x64
7ff03c0c01a...cd.exe
windows10-2004-x64
10ff1699c2d9...5a.exe
windows7-x64
10ff1699c2d9...5a.exe
windows10-2004-x64
10ff573ccb26...dd.exe
windows7-x64
10ff573ccb26...dd.exe
windows10-2004-x64
10ff5eef1816...3f.exe
windows7-x64
10ff5eef1816...3f.exe
windows10-2004-x64
10ff9b69031d...c2.exe
windows7-x64
10ff9b69031d...c2.exe
windows10-2004-x64
10ffc0421dee...0b.exe
windows7-x64
10ffc0421dee...0b.exe
windows10-2004-x64
7ffc45f2c58...73.exe
windows7-x64
10ffc45f2c58...73.exe
windows10-2004-x64
10fffa7ee6ec...91.exe
windows7-x64
10fffa7ee6ec...91.exe
windows10-2004-x64
10Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:18
Behavioral task
behavioral1
Sample
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
fe282eaa9036b889aafc6db602127b45.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
fe282eaa9036b889aafc6db602127b45.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
fe55574c53882722b864ad5f07d521c0.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
fe55574c53882722b864ad5f07d521c0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
feb2c82a6695709d9304734b55a6a350.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
feb2c82a6695709d9304734b55a6a350.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
ff03c0c01a5acef84aa5acdf32b445cd.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
ff03c0c01a5acef84aa5acdf32b445cd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
ff1699c2d9f4f22e51e270417a93a15a.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ff1699c2d9f4f22e51e270417a93a15a.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
ff573ccb268f734e737c764bc60f0ddd.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ff573ccb268f734e737c764bc60f0ddd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
ff5eef1816b5037715c6da38464a8a3f.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
ff5eef1816b5037715c6da38464a8a3f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
ffc0421deeff7949183a7fbc2e55850b.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
ffc0421deeff7949183a7fbc2e55850b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
ffc45f2c5865480a76df2d8f64009673.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ffc45f2c5865480a76df2d8f64009673.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
fffa7ee6ec076412930605bd55bbc491.exe
Resource
win7-20240903-en
General
-
Target
ff1699c2d9f4f22e51e270417a93a15a.exe
-
Size
849KB
-
MD5
ff1699c2d9f4f22e51e270417a93a15a
-
SHA1
9f17a9e3c2d549d24fa993c723a3ad50b7f60ba6
-
SHA256
5569d2a749ae8057fb0b05849ad9bf5cef65f28c081cae2a2ddc8ae1e7c76528
-
SHA512
dc7fac70d397ad94321b1b81c2d53cfe4bc6d444e4f7a5a5f6804ab1529ca6ed41cd1a16675738ce2f083e291bdd4f7efe3053cff61ce4287a5fc719a90c910d
-
SSDEEP
12288:o6NE5ig5Fttrh5PxjUm5SvDdLILaBFkjKuAMx6A5gtbGk84Ca04jtiPBgGKYTx:o6N297PxbsKtC5AHgk
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 42 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2764 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2544 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2696 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2648 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2532 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1028 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1484 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2288 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1668 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1092 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 584 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1500 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 320 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1336 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1244 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2880 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1052 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 408 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2800 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 636 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 700 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 916 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1332 2208 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 2208 schtasks.exe 31 -
resource yara_rule behavioral19/memory/1868-1-0x0000000000D00000-0x0000000000DDA000-memory.dmp dcrat behavioral19/files/0x00060000000190ce-17.dat dcrat behavioral19/files/0x000600000001a433-62.dat dcrat behavioral19/files/0x0007000000018687-73.dat dcrat behavioral19/files/0x0008000000018c1a-82.dat dcrat behavioral19/files/0x000b000000018c1a-106.dat dcrat behavioral19/files/0x0003000000013d08-117.dat dcrat behavioral19/files/0x000800000001922c-128.dat dcrat behavioral19/memory/2876-211-0x0000000000850000-0x000000000092A000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2876 WmiPrvSE.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File created C:\Program Files\DVD Maker\ja-JP\7a0fd90576e088 ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\f8a1ec94918eb0 ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Program Files\Google\Chrome\lsass.exe ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\101b941d020240 ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Program Files\7-Zip\WmiPrvSE.exe ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\RCXF8BC.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\Google\Chrome\lsass.exe ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\7-Zip\WmiPrvSE.exe ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Program Files\Google\services.exe ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\ff1699c2d9f4f22e51e270417a93a15a.exe ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Program Files\Google\c5b4cb5e9653cc ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\lsm.exe ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\Google\services.exe ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\RCXFD41.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\ff1699c2d9f4f22e51e270417a93a15a.exe ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\RCX8B0.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\RCX8B1.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\lsm.exe ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Program Files\Google\Chrome\6203df4a6bafc7 ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\explorer.exe ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\Google\RCX236.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\Google\Chrome\RCX6AD.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Program Files\DVD Maker\ja-JP\explorer.exe ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Program Files\7-Zip\24dbde2999530e ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\RCXF8BB.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\RCXFDAF.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\Google\RCX235.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\Google\Chrome\RCX6AC.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\7-Zip\RCXAB5.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Program Files\7-Zip\RCXAB6.tmp ff1699c2d9f4f22e51e270417a93a15a.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\ModemLogs\f8a1ec94918eb0 ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Windows\ModemLogs\RCXFFB3.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Windows\es-ES\ff1699c2d9f4f22e51e270417a93a15a.exe ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Windows\es-ES\f8a1ec94918eb0 ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Windows\ModemLogs\RCX21.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Windows\ModemLogs\ff1699c2d9f4f22e51e270417a93a15a.exe ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Windows\es-ES\RCX43A.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Windows\es-ES\RCX43B.tmp ff1699c2d9f4f22e51e270417a93a15a.exe File opened for modification C:\Windows\es-ES\ff1699c2d9f4f22e51e270417a93a15a.exe ff1699c2d9f4f22e51e270417a93a15a.exe File created C:\Windows\ModemLogs\ff1699c2d9f4f22e51e270417a93a15a.exe ff1699c2d9f4f22e51e270417a93a15a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2764 schtasks.exe 2608 schtasks.exe 2440 schtasks.exe 2624 schtasks.exe 1052 schtasks.exe 1340 schtasks.exe 700 schtasks.exe 1332 schtasks.exe 1484 schtasks.exe 1668 schtasks.exe 1336 schtasks.exe 2920 schtasks.exe 2996 schtasks.exe 2288 schtasks.exe 2596 schtasks.exe 2632 schtasks.exe 2800 schtasks.exe 2844 schtasks.exe 2828 schtasks.exe 2672 schtasks.exe 2880 schtasks.exe 408 schtasks.exe 1520 schtasks.exe 2640 schtasks.exe 1736 schtasks.exe 2696 schtasks.exe 2532 schtasks.exe 1028 schtasks.exe 320 schtasks.exe 1244 schtasks.exe 916 schtasks.exe 2544 schtasks.exe 2300 schtasks.exe 1092 schtasks.exe 584 schtasks.exe 1500 schtasks.exe 2868 schtasks.exe 2648 schtasks.exe 1644 schtasks.exe 2376 schtasks.exe 636 schtasks.exe 2180 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1868 ff1699c2d9f4f22e51e270417a93a15a.exe 1868 ff1699c2d9f4f22e51e270417a93a15a.exe 1868 ff1699c2d9f4f22e51e270417a93a15a.exe 2876 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1868 ff1699c2d9f4f22e51e270417a93a15a.exe Token: SeDebugPrivilege 2876 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1868 wrote to memory of 944 1868 ff1699c2d9f4f22e51e270417a93a15a.exe 74 PID 1868 wrote to memory of 944 1868 ff1699c2d9f4f22e51e270417a93a15a.exe 74 PID 1868 wrote to memory of 944 1868 ff1699c2d9f4f22e51e270417a93a15a.exe 74 PID 944 wrote to memory of 668 944 cmd.exe 76 PID 944 wrote to memory of 668 944 cmd.exe 76 PID 944 wrote to memory of 668 944 cmd.exe 76 PID 944 wrote to memory of 2876 944 cmd.exe 77 PID 944 wrote to memory of 2876 944 cmd.exe 77 PID 944 wrote to memory of 2876 944 cmd.exe 77 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff1699c2d9f4f22e51e270417a93a15a.exe"C:\Users\Admin\AppData\Local\Temp\ff1699c2d9f4f22e51e270417a93a15a.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Dg5wW3gSHs.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:668
-
-
C:\Program Files\7-Zip\WmiPrvSE.exe"C:\Program Files\7-Zip\WmiPrvSE.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ff1699c2d9f4f22e51e270417a93a15af" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\ff1699c2d9f4f22e51e270417a93a15a.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ff1699c2d9f4f22e51e270417a93a15a" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\ff1699c2d9f4f22e51e270417a93a15a.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ff1699c2d9f4f22e51e270417a93a15af" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\ff1699c2d9f4f22e51e270417a93a15a.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Users\Default User\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Templates\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\All Users\Templates\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Templates\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default User\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files\DVD Maker\ja-JP\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\DVD Maker\ja-JP\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Program Files\DVD Maker\ja-JP\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ff1699c2d9f4f22e51e270417a93a15af" /sc MINUTE /mo 12 /tr "'C:\Program Files\VideoLAN\VLC\skins\fonts\ff1699c2d9f4f22e51e270417a93a15a.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ff1699c2d9f4f22e51e270417a93a15a" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\skins\fonts\ff1699c2d9f4f22e51e270417a93a15a.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ff1699c2d9f4f22e51e270417a93a15af" /sc MINUTE /mo 14 /tr "'C:\Program Files\VideoLAN\VLC\skins\fonts\ff1699c2d9f4f22e51e270417a93a15a.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ff1699c2d9f4f22e51e270417a93a15af" /sc MINUTE /mo 11 /tr "'C:\Windows\ModemLogs\ff1699c2d9f4f22e51e270417a93a15a.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ff1699c2d9f4f22e51e270417a93a15a" /sc ONLOGON /tr "'C:\Windows\ModemLogs\ff1699c2d9f4f22e51e270417a93a15a.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ff1699c2d9f4f22e51e270417a93a15af" /sc MINUTE /mo 5 /tr "'C:\Windows\ModemLogs\ff1699c2d9f4f22e51e270417a93a15a.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Program Files\Google\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Google\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Program Files\Google\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ff1699c2d9f4f22e51e270417a93a15af" /sc MINUTE /mo 14 /tr "'C:\Windows\es-ES\ff1699c2d9f4f22e51e270417a93a15a.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ff1699c2d9f4f22e51e270417a93a15a" /sc ONLOGON /tr "'C:\Windows\es-ES\ff1699c2d9f4f22e51e270417a93a15a.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ff1699c2d9f4f22e51e270417a93a15af" /sc MINUTE /mo 8 /tr "'C:\Windows\es-ES\ff1699c2d9f4f22e51e270417a93a15a.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Program Files\Google\Chrome\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\Chrome\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Media Player\fr-FR\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\fr-FR\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Media Player\fr-FR\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files\7-Zip\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\7-Zip\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Libraries\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\Public\Libraries\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Libraries\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
849KB
MD51805fe2df868e2b0cd4ef1e0f9f9e551
SHA10e77bdb7b472b99c72f96e6f424a562018acc33f
SHA25673584a81f743744a921b9149a1daec7ed304a4179522407435a8878134ad163d
SHA512dc93888ccbc082c829e97626a47479c51dc3f820469f04d5b140e501ca9df805573f9ea7eeb551ab824c47ff6db78df60afea9a444530aa3b52249297c493f1f
-
Filesize
849KB
MD5ff1699c2d9f4f22e51e270417a93a15a
SHA19f17a9e3c2d549d24fa993c723a3ad50b7f60ba6
SHA2565569d2a749ae8057fb0b05849ad9bf5cef65f28c081cae2a2ddc8ae1e7c76528
SHA512dc7fac70d397ad94321b1b81c2d53cfe4bc6d444e4f7a5a5f6804ab1529ca6ed41cd1a16675738ce2f083e291bdd4f7efe3053cff61ce4287a5fc719a90c910d
-
Filesize
849KB
MD53c18729540db397d2b53920a89efaa87
SHA1a49ee652f70b21fb7f3a836535151fc7b37ba956
SHA256ad0cc5b7ff17346fa17dad8fa76bcb37ae3a59ef60d6374df69c071eced4ba97
SHA5128d68d49cb6e51f1d2966003042845a5dc29daa1271f3c0488aef2fa2d5e005ef9f972e20856407d6ec420a84a38a329a9ba7500e72f47ba3c9f41c82bfe4c00f
-
Filesize
849KB
MD5dedd86af346a771444fcede78d81925b
SHA194e94a0b005310070e081ba731ac55482ef996ec
SHA25686fe060995ed0fa6d943073ea2b445b306fad05cf4b839cd909af20b7bb4377f
SHA512bc74fbefbf02b8acd4ef55b44f5e852b3ba3599bba185a9e8ab1c698ea7a9473e5b437cb6b15c78088e268f88f6a99331292246827456d531219f85d53fdc5b5
-
Filesize
200B
MD530d518c3ea7acab0fcc75a8cfa024132
SHA1753012b52246f3342ba69e3e7a135b1897779c98
SHA2566ef40d3db18a22be5f1f5b17e1cadd3bd57175ad2123816beea5357dbc46f155
SHA51241206117f5c9a9126146a9d9e0a4fe01d95f6774595232bfd941f53cf2ce3275487a9e571bb90fb2eacddd2c89d06cda56246ea6171946b22f8977778e6ab9d9
-
Filesize
849KB
MD575cf751e28cce732aed5289266f99cfa
SHA1248c3b19bb4ff6e4ae56eec86da9e13c97d3577e
SHA25617fe48032e7d1617553b194b9e6f6b1bf184b2c8c43587dea0ab36411ad949aa
SHA51244ce56bec9536e2f32e031ade55abfd5f578d49b41ff3d448871fa01b2a566de3651f19647bce45e089539a8f1fa65d2bc17e3453f658509187f2db09ff3e5f5
-
Filesize
849KB
MD504784eff8c7b071770d8fb68afaebd1e
SHA17eb17d05c89b81b45afe377cbf356413328c458e
SHA256e13d68745348bd7131dba253198e4dd078bdde749ddcc6a26a3c9f5e65a44fc5
SHA51208728bb054785d2abcaba4def8c756aae95fcd259b31b270a6f14fef95190a2dd39ea278e090ee00c235fed9a3fb0ec49cb4202de74b83f914f2409f6ea7e535
-
Filesize
849KB
MD535054ade96141c06e97c38403544a9b5
SHA12a5d5d8561b465855613ec63520089c1833a1b59
SHA256cbf31e4f3e34e1623478f0def3ec4de77c6b01e616b472bf51f10e1de5a4308d
SHA5125c2104588a8fddfe9f26c344d8c084b2c15c57759162814bf4f01c45998c4e99f8b1f1fee9513bf6a6ba175674db194a8f4a38235ce03ca79cfd51b6505c6bfa