Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:09

General

  • Target

    3d81f411b0ec1ac7d861358e145db4ba.exe

  • Size

    999KB

  • MD5

    3d81f411b0ec1ac7d861358e145db4ba

  • SHA1

    4b945e693bc455840912fc5b5f155c36501d235e

  • SHA256

    72b49e4d9aa54af40111e35d0d4bcb4a7a313c4f2f5c5f33c3b7a093b7f4fc0e

  • SHA512

    216c654e895ec5065b7d724f5421184e2a3445f4b801f0ebcc3ce34676e2d89240f22af079fd7a7d074af3567ee483ebe2f6b40bfea224956ff00f5d326894fe

  • SSDEEP

    12288:H9pLLk45WSSY1BX6f4bIS7rMNetPfC9Vs6IFGs0jxAqXj9xPSI0dzNgCoD7WX+Iu:H9pP5WS3lrMNyC9TJPCXBi

Malware Config

Signatures

  • DcRat 64 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 19 IoCs
  • Process spawned unexpected child process 64 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 19 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Drops file in Windows directory 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d81f411b0ec1ac7d861358e145db4ba.exe
    "C:\Users\Admin\AppData\Local\Temp\3d81f411b0ec1ac7d861358e145db4ba.exe"
    1⤵
    • DcRat
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aNa3Lme8Pe.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2252
        • C:\Windows\RemotePackages\RemoteDesktops\OSPPSVC.exe
          "C:\Windows\RemotePackages\RemoteDesktops\OSPPSVC.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1380
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc MINUTE /mo 7 /tr "'C:\Windows\Temp\Crashpad\reports\lsm.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2980
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\Temp\Crashpad\reports\lsm.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1804
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONSTART /tr "'C:\Windows\Temp\Crashpad\reports\lsm.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2764
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Windows\Temp\Crashpad\reports\lsm.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2712
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      PID:2648
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1256
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONSTART /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      PID:2416
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\winlogon.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2564
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Sidebar\csrss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:836
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\csrss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2076
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONSTART /tr "'C:\Program Files (x86)\Windows Sidebar\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2004
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Sidebar\csrss.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2524
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsass" /sc MINUTE /mo 14 /tr "'C:\Windows\debug\lsass.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2072
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\debug\lsass.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      PID:1432
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsass" /sc ONSTART /tr "'C:\Windows\debug\lsass.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2856
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Windows\debug\lsass.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2960
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc MINUTE /mo 10 /tr "'C:\ProgramData\Adobe\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      PID:3008
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\ProgramData\Adobe\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2316
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONSTART /tr "'C:\ProgramData\Adobe\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2828
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\ProgramData\Adobe\spoolsv.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2836
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "3d81f411b0ec1ac7d861358e145db4ba" /sc MINUTE /mo 8 /tr "'C:\ProgramData\Package Cache\{662A0088-6FCD-45DD-9EA7-68674058AED5}v14.30.30704\3d81f411b0ec1ac7d861358e145db4ba.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2184
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "3d81f411b0ec1ac7d861358e145db4ba" /sc ONLOGON /tr "'C:\ProgramData\Package Cache\{662A0088-6FCD-45DD-9EA7-68674058AED5}v14.30.30704\3d81f411b0ec1ac7d861358e145db4ba.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:380
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "3d81f411b0ec1ac7d861358e145db4ba" /sc ONSTART /tr "'C:\ProgramData\Package Cache\{662A0088-6FCD-45DD-9EA7-68674058AED5}v14.30.30704\3d81f411b0ec1ac7d861358e145db4ba.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      PID:620
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "3d81f411b0ec1ac7d861358e145db4ba3" /sc MINUTE /mo 9 /tr "'C:\ProgramData\Package Cache\{662A0088-6FCD-45DD-9EA7-68674058AED5}v14.30.30704\3d81f411b0ec1ac7d861358e145db4ba.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1504
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "3d81f411b0ec1ac7d861358e145db4ba" /sc MINUTE /mo 10 /tr "'C:\Windows\Vss\Writers\3d81f411b0ec1ac7d861358e145db4ba.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1428
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "3d81f411b0ec1ac7d861358e145db4ba" /sc ONLOGON /tr "'C:\Windows\Vss\Writers\3d81f411b0ec1ac7d861358e145db4ba.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:940
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "3d81f411b0ec1ac7d861358e145db4ba" /sc ONSTART /tr "'C:\Windows\Vss\Writers\3d81f411b0ec1ac7d861358e145db4ba.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:280
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "3d81f411b0ec1ac7d861358e145db4ba3" /sc MINUTE /mo 8 /tr "'C:\Windows\Vss\Writers\3d81f411b0ec1ac7d861358e145db4ba.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1140
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVC" /sc MINUTE /mo 5 /tr "'C:\Windows\RemotePackages\RemoteDesktops\OSPPSVC.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2440
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\RemotePackages\RemoteDesktops\OSPPSVC.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2284
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVC" /sc ONSTART /tr "'C:\Windows\RemotePackages\RemoteDesktops\OSPPSVC.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2208
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Windows\RemotePackages\RemoteDesktops\OSPPSVC.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2780
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\smss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2180
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Admin\smss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2580
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONSTART /tr "'C:\Users\Admin\smss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      PID:1108
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\smss.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1156
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Start Menu\dwm.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2064
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Admin\Start Menu\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2016
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONSTART /tr "'C:\Users\Admin\Start Menu\dwm.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:700
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Start Menu\dwm.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:668
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc MINUTE /mo 14 /tr "'C:\Program Files\MSBuild\wininit.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2468
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\MSBuild\wininit.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1344
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc ONSTART /tr "'C:\Program Files\MSBuild\wininit.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1572
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Program Files\MSBuild\wininit.exe'" /f
      1⤵
      • Process spawned unexpected child process
      PID:1688
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:896
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:600
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONSTART /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2024
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\spoolsv.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1960
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc MINUTE /mo 6 /tr "'C:\Windows\L2Schemas\csrss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2388
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\L2Schemas\csrss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2300
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONSTART /tr "'C:\Windows\L2Schemas\csrss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1676
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Windows\L2Schemas\csrss.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1000
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "3d81f411b0ec1ac7d861358e145db4ba" /sc MINUTE /mo 6 /tr "'C:\ProgramData\Desktop\3d81f411b0ec1ac7d861358e145db4ba.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3020
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "3d81f411b0ec1ac7d861358e145db4ba" /sc ONLOGON /tr "'C:\ProgramData\Desktop\3d81f411b0ec1ac7d861358e145db4ba.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1528
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "3d81f411b0ec1ac7d861358e145db4ba" /sc ONSTART /tr "'C:\ProgramData\Desktop\3d81f411b0ec1ac7d861358e145db4ba.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      PID:888
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "3d81f411b0ec1ac7d861358e145db4ba3" /sc MINUTE /mo 8 /tr "'C:\ProgramData\Desktop\3d81f411b0ec1ac7d861358e145db4ba.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1012
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Idle" /sc MINUTE /mo 7 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\Idle.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2496
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\Idle.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1680
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Idle" /sc ONSTART /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\Idle.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2748
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\Idle.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2604
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Documents\My Videos\smss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      PID:2268
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Admin\Documents\My Videos\smss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2772
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONSTART /tr "'C:\Users\Admin\Documents\My Videos\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2616
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Documents\My Videos\smss.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      PID:2540
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc MINUTE /mo 14 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2356
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Scheduled Task/Job: Scheduled Task
      PID:1300
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONSTART /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Scheduled Task/Job: Scheduled Task
      PID:1804
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\WmiPrvSE.exe'" /f
      1⤵
      • DcRat
      • Scheduled Task/Job: Scheduled Task
      PID:2764
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender\it-IT\System.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Scheduled Task/Job: Scheduled Task
      PID:3004
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\it-IT\System.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Scheduled Task/Job: Scheduled Task
      PID:2628
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONSTART /tr "'C:\Program Files\Windows Defender\it-IT\System.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Scheduled Task/Job: Scheduled Task
      PID:2876
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Defender\it-IT\System.exe'" /f
      1⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2696
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVC" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Google\CrashReports\OSPPSVC.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      PID:2416
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\OSPPSVC.exe'" /rl HIGHEST /f
      1⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1256
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVC" /sc ONSTART /tr "'C:\Program Files (x86)\Google\CrashReports\OSPPSVC.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      PID:604
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Google\CrashReports\OSPPSVC.exe'" /f
      1⤵
      • DcRat
      • Scheduled Task/Job: Scheduled Task
      PID:1148

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\MSBuild\wininit.exe

      Filesize

      999KB

      MD5

      c0215b3396e9263d29d8b8ad43e2c167

      SHA1

      290199d42e133f273fa8af901cafa9601445db9e

      SHA256

      9b87251ea6c60932f30c5a39ce54cc73e6f68b0a62aaee7ae2b5814e1c19071f

      SHA512

      372f93a6756c7b36ba443c17bcf78709ae395c61ed2c0722e1131c69077f66086a4ff712690d7909bdd10eb53c402d6b4574d9a75aa44d8bfa8dbee939c40da3

    • C:\ProgramData\Adobe\spoolsv.exe

      Filesize

      999KB

      MD5

      3d81f411b0ec1ac7d861358e145db4ba

      SHA1

      4b945e693bc455840912fc5b5f155c36501d235e

      SHA256

      72b49e4d9aa54af40111e35d0d4bcb4a7a313c4f2f5c5f33c3b7a093b7f4fc0e

      SHA512

      216c654e895ec5065b7d724f5421184e2a3445f4b801f0ebcc3ce34676e2d89240f22af079fd7a7d074af3567ee483ebe2f6b40bfea224956ff00f5d326894fe

    • C:\ProgramData\Adobe\spoolsv.exe

      Filesize

      999KB

      MD5

      6b39f93e65cd12b01a0a5af5bf50de36

      SHA1

      5ec960903284f34ad1eca0de8681ce6848e3fc34

      SHA256

      4d052c853451b60733a3c8acfd177d1c9b32adacb38ed4f1572f704b3311f069

      SHA512

      6671dfec909f7bddfca2a23edce78a4c80ba10940bd8355c6c90b42ea24837dc375b89eae9966070ac31b1d835abbcf1e17c2acad29d6d0fd600d9c795ee4f52

    • C:\Users\Admin\AppData\Local\Temp\aNa3Lme8Pe.bat

      Filesize

      216B

      MD5

      3a7a8caaa21977e6ece0f4e2068645c5

      SHA1

      3500ba21e650238ba359eb034f7bef9acc2fb661

      SHA256

      3e06ba76fb41583907352956f24a9807aaa4d568d3d16c288b5189d7407c5a17

      SHA512

      d5adc2bac57e1d60a4b3e07a9f61a0007d328bc91a59b049afc88836a8db54216ffb549d7467876e4f0446a0ba9285dd705e77fc87e82e8026cee41be3a60b49

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\dwm.exe

      Filesize

      999KB

      MD5

      b4e09e6a830ebfc4a1583677259ce767

      SHA1

      7bbf101f623586c0b1fcb645fb4dd088d648940e

      SHA256

      35c4fb89309bc00ecc4df463decebd48b8c21bc082e4eb43eaf771985fbe0ce3

      SHA512

      cbab6c6529657c25e561e2936a8f47bb5ce4299e138ceb874ad28eab7fdc145596a6743a339469484b287cf59b397213a809af5b41bef2ac346a10e9c35c4daf

    • C:\Users\Admin\Videos\smss.exe

      Filesize

      999KB

      MD5

      9efc9dcfbcc92007e5e125bb064fe731

      SHA1

      d2d8c3e54a7f89c655d023136977f53a08cb681f

      SHA256

      5c182e0cdab48f85bc51f27d9afcac40b0f154ba905dc6ced8c938ea8bde4f9b

      SHA512

      83edc8c16b7bd5fa41fb40bb1e7e828d2f3cecca50b3eb29d4c43b705324ef3d82a3d24b592552a4e8777261794254f1b712afeb1bc8f57831968b2677fe7a5d

    • C:\Windows\RemotePackages\RemoteDesktops\OSPPSVC.exe

      Filesize

      999KB

      MD5

      16edeea873e30606c95676ca11304bee

      SHA1

      8bc06c9d497a4b7a80918d40695fce9daece7e8e

      SHA256

      986347a1aaa9d0e1567208924bf4cdd230ce1423807ab06211e3ba7eaf4d9b82

      SHA512

      3cd077c1d560a6743129a775442b46f492b1c908ab93f5f6d521bfe1edc9d9934f82f4193a6cc3eaee8b13c697648ccbcdcc95f490b25d4ce0599953a2e6350a

    • C:\Windows\Vss\Writers\3d81f411b0ec1ac7d861358e145db4ba.exe

      Filesize

      999KB

      MD5

      870f5940e595217ef7a4d3dbb64796cc

      SHA1

      f92419fb200d4e835aec045adc167367593192e7

      SHA256

      b636f1389bb79e93c79484e0b5cc1faa7f0cf5f1b5b70abd7bfc2920e4007f76

      SHA512

      b34da40fdf33125cc88dec78c1478e54dd7c812546706e2a8fd749cfea18887f3440090f0ce68678d495ae14639bd2d24603454d5eb806dbb5a4c38ed79dc88b

    • memory/1380-285-0x0000000000BA0000-0x0000000000CA0000-memory.dmp

      Filesize

      1024KB

    • memory/2096-6-0x0000000000480000-0x0000000000490000-memory.dmp

      Filesize

      64KB

    • memory/2096-4-0x0000000000430000-0x0000000000440000-memory.dmp

      Filesize

      64KB

    • memory/2096-9-0x00000000004B0000-0x00000000004BC000-memory.dmp

      Filesize

      48KB

    • memory/2096-8-0x00000000004A0000-0x00000000004AE000-memory.dmp

      Filesize

      56KB

    • memory/2096-7-0x0000000000490000-0x000000000049C000-memory.dmp

      Filesize

      48KB

    • memory/2096-5-0x0000000000470000-0x0000000000480000-memory.dmp

      Filesize

      64KB

    • memory/2096-0-0x000007FEF5443000-0x000007FEF5444000-memory.dmp

      Filesize

      4KB

    • memory/2096-10-0x00000000004C0000-0x00000000004CC000-memory.dmp

      Filesize

      48KB

    • memory/2096-192-0x000007FEF5443000-0x000007FEF5444000-memory.dmp

      Filesize

      4KB

    • memory/2096-217-0x000007FEF5440000-0x000007FEF5E2C000-memory.dmp

      Filesize

      9.9MB

    • memory/2096-3-0x0000000000450000-0x000000000046C000-memory.dmp

      Filesize

      112KB

    • memory/2096-281-0x000007FEF5440000-0x000007FEF5E2C000-memory.dmp

      Filesize

      9.9MB

    • memory/2096-2-0x000007FEF5440000-0x000007FEF5E2C000-memory.dmp

      Filesize

      9.9MB

    • memory/2096-1-0x0000000000990000-0x0000000000A90000-memory.dmp

      Filesize

      1024KB