Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:13

General

  • Target

    7fa6bf4f199a845715d9f5807a98d9ab.exe

  • Size

    885KB

  • MD5

    7fa6bf4f199a845715d9f5807a98d9ab

  • SHA1

    25652948f2c3d400323873cb41bbc6b2b609d96a

  • SHA256

    06198c97d0afdc17232dc3ffc8d5b23b5b97d82cf01bcdf8ef1236f08812e702

  • SHA512

    99a56b7ddd2ff25d220e25c2ae1b0b92d8ee68313b54a23a937587e2677a9a776b8e55593c9b9dbd3b01c7365d006bba81066c747398afa6f23a53f9530b276c

  • SSDEEP

    12288:0lNE5VnZuh+ZIlXJBH5SP2I/lwvDT77/wOKsV42i3GULVaHeopyyx:0lNCv6XJ5BClaXfD9vUha+u

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 54 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 12 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 11 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 54 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fa6bf4f199a845715d9f5807a98d9ab.exe
    "C:\Users\Admin\AppData\Local\Temp\7fa6bf4f199a845715d9f5807a98d9ab.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Xk1H8t4K12.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1288
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2840
        • C:\Users\Default User\winlogon.exe
          "C:\Users\Default User\winlogon.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1680
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0e12ed23-83ed-47f3-a15a-1b0511342199.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2980
            • C:\Users\Default User\winlogon.exe
              "C:\Users\Default User\winlogon.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1640
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2db4e8d0-1dea-4eee-bf5b-19fe82c5334b.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2484
                • C:\Users\Default User\winlogon.exe
                  "C:\Users\Default User\winlogon.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1324
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\61fa0062-b0ae-461b-abd8-5ef17ea01eb3.vbs"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1952
                    • C:\Users\Default User\winlogon.exe
                      "C:\Users\Default User\winlogon.exe"
                      9⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1700
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1f8aeb13-f6c7-4c08-8c6c-ba95ddd32c79.vbs"
                        10⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1136
                        • C:\Users\Default User\winlogon.exe
                          "C:\Users\Default User\winlogon.exe"
                          11⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2676
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bbc01160-5257-45a7-8a50-365748fe08d9.vbs"
                            12⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1692
                            • C:\Users\Default User\winlogon.exe
                              "C:\Users\Default User\winlogon.exe"
                              13⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:1588
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ee050952-ac39-4d15-be92-b5640f54fc0c.vbs"
                                14⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2800
                                • C:\Users\Default User\winlogon.exe
                                  "C:\Users\Default User\winlogon.exe"
                                  15⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:2552
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8964e000-42e4-4ad6-b774-0942c9693e3b.vbs"
                                    16⤵
                                      PID:1780
                                      • C:\Users\Default User\winlogon.exe
                                        "C:\Users\Default User\winlogon.exe"
                                        17⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2912
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\253710d3-3624-441d-a5ed-0638bcb18bdd.vbs"
                                          18⤵
                                            PID:2120
                                            • C:\Users\Default User\winlogon.exe
                                              "C:\Users\Default User\winlogon.exe"
                                              19⤵
                                              • Executes dropped EXE
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2896
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dcf0915b-fe1f-45cd-84ce-8cd4b04b4dc6.vbs"
                                                20⤵
                                                  PID:2876
                                                  • C:\Users\Default User\winlogon.exe
                                                    "C:\Users\Default User\winlogon.exe"
                                                    21⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2544
                                                    • C:\Windows\System32\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d1b556e7-9b18-4d35-bf93-e9ab22357907.vbs"
                                                      22⤵
                                                        PID:2780
                                                        • C:\Users\Default User\winlogon.exe
                                                          "C:\Users\Default User\winlogon.exe"
                                                          23⤵
                                                          • Executes dropped EXE
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1868
                                                          • C:\Windows\System32\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\68a6e94a-e80b-448c-952d-507cfdb96cc8.vbs"
                                                            24⤵
                                                              PID:2628
                                                            • C:\Windows\System32\WScript.exe
                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\eb9ce0ce-688a-45ee-8277-5f3278948c80.vbs"
                                                              24⤵
                                                                PID:1312
                                                          • C:\Windows\System32\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1f55cb93-779d-4397-8e78-bb41f62788f2.vbs"
                                                            22⤵
                                                              PID:3048
                                                        • C:\Windows\System32\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a8cdfccb-1b33-4cab-8204-14c08a227ef0.vbs"
                                                          20⤵
                                                            PID:2592
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\180243ce-7417-4c16-8dfa-32baa6a68b35.vbs"
                                                        18⤵
                                                          PID:436
                                                    • C:\Windows\System32\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8976e9a0-3212-4b08-b8cd-b11afd0abfe6.vbs"
                                                      16⤵
                                                        PID:1872
                                                  • C:\Windows\System32\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c43446ff-d067-41ef-b391-646342c4514f.vbs"
                                                    14⤵
                                                      PID:2112
                                                • C:\Windows\System32\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cca50ff2-9c78-44c4-a51b-f2daba225851.vbs"
                                                  12⤵
                                                    PID:2168
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\009612e0-4601-470a-a733-19d2f9042322.vbs"
                                                10⤵
                                                  PID:1656
                                            • C:\Windows\System32\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4b81b1c3-f6eb-42f0-b265-d61a3b7fc026.vbs"
                                              8⤵
                                                PID:1756
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fa288008-c99e-407f-a116-9fcf02f6df68.vbs"
                                            6⤵
                                              PID:560
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2d47ddc8-edd0-46b3-a279-bbd193e62c80.vbs"
                                          4⤵
                                            PID:2972
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1468
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2900
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2156
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Windows\Microsoft.NET\Framework64\1036\lsass.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2912
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\Framework64\1036\lsass.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2796
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Windows\Microsoft.NET\Framework64\1036\lsass.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2756
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\System.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2860
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\System.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2224
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\System.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2556
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\wininit.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1576
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\wininit.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:876
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\wininit.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:776
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\wininit.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2652
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\wininit.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2516
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\wininit.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:3060
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Mail\de-DE\csrss.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2840
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\de-DE\csrss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1472
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Mail\de-DE\csrss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2148
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\System.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2000
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2808
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2364
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\lsm.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2568
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\MSOCache\All Users\lsm.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:304
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\lsm.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1112
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Microsoft Office\Office14\csrss.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1496
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\csrss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2472
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Microsoft Office\Office14\csrss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:832
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\winlogon.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1160
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\winlogon.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2200
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\winlogon.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1404
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\spoolsv.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2704
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\spoolsv.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1136
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\spoolsv.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2064
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\csrss.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:872
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\csrss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2116
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\csrss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2632
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\services.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1660
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\services.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1532
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\services.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1656
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\lsm.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2360
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\lsm.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1596
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 14 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\lsm.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1436
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\OSPPSVC.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2660
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\OSPPSVC.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:952
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\OSPPSVC.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:760
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\winlogon.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1904
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default User\winlogon.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1120
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\winlogon.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1716
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\dllhost.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2136
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\dllhost.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2448
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\dllhost.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1748
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\csrss.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2128
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\csrss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:892
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\csrss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2608

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\MSOCache\All Users\RCX2313.tmp

                                      Filesize

                                      885KB

                                      MD5

                                      d6c9d7b53b6b89f311746e7ce8654f2b

                                      SHA1

                                      000f72000d3808205f38e0a2ae3caf6a5f329e71

                                      SHA256

                                      60dcc8b0aceaac546e94eae5926eefd208a946b8e1c67862b530f8b19bf229d5

                                      SHA512

                                      30ddd0dba5860a53a3c96116c58e65536ecec4e363695a30f3ac84fdf21f2836cc96395153ed22d17bef71007fe5b06f3a499598a6ba3a0a9fdef8ec440c6101

                                    • C:\Program Files (x86)\Windows Photo Viewer\it-IT\wininit.exe

                                      Filesize

                                      885KB

                                      MD5

                                      7fa6bf4f199a845715d9f5807a98d9ab

                                      SHA1

                                      25652948f2c3d400323873cb41bbc6b2b609d96a

                                      SHA256

                                      06198c97d0afdc17232dc3ffc8d5b23b5b97d82cf01bcdf8ef1236f08812e702

                                      SHA512

                                      99a56b7ddd2ff25d220e25c2ae1b0b92d8ee68313b54a23a937587e2677a9a776b8e55593c9b9dbd3b01c7365d006bba81066c747398afa6f23a53f9530b276c

                                    • C:\Program Files\Windows Mail\de-DE\csrss.exe

                                      Filesize

                                      885KB

                                      MD5

                                      7a57f136ff9f74cc9b2ad5fa7d3df67a

                                      SHA1

                                      915db35635e1a605a7b1bab2c3df750e84c51c16

                                      SHA256

                                      53e66c451b086721ce28cf46ee13f5c2dfd007e12b8cd34fdb382410e19885f2

                                      SHA512

                                      1393699eb541385dc87a2f5e672e1342c3a2c5534c2a5ae51095055dd3c41a58e778df06cd8b269075e7647a6a2a118f30552518f9a3fbcba501ba30b19c8503

                                    • C:\Users\Admin\AppData\Local\Temp\0e12ed23-83ed-47f3-a15a-1b0511342199.vbs

                                      Filesize

                                      710B

                                      MD5

                                      ab430474e4a97a230d677673a3e7cb22

                                      SHA1

                                      48daa34ccde283cf1cbcb14d630f884e6a868456

                                      SHA256

                                      18b45219550c218d7e91b0558df33f5d4ed597e09f172d98cdc01668a629210c

                                      SHA512

                                      d8f4b10f79301d9aa0e913a96d552e6e0edb9014a469af0ceb01aa8d85222aa2bd00213d569eaf39e96a81ce23af2e027f1c6e3bb68ab486ffbcfb18a07f0570

                                    • C:\Users\Admin\AppData\Local\Temp\1f8aeb13-f6c7-4c08-8c6c-ba95ddd32c79.vbs

                                      Filesize

                                      710B

                                      MD5

                                      a052766263ea3eddbef3416ee1bb1f3b

                                      SHA1

                                      1338041786e178b84eb6994782f505cbc7d78908

                                      SHA256

                                      5751a9e23a356b7a6941d28b74e561898eb624fa5fb311c64dcc6afbdfdc1ea6

                                      SHA512

                                      1e0b6c9d9f57bbe47f714e65866a169a868982e4859a4f8022ae6c5ab69c53bf60214ece35bb47268fc10dfdcdcc6336fced689f918e8226a7337dae8756ab0d

                                    • C:\Users\Admin\AppData\Local\Temp\253710d3-3624-441d-a5ed-0638bcb18bdd.vbs

                                      Filesize

                                      710B

                                      MD5

                                      50cf6a01ddf4bb318bd09669f845af39

                                      SHA1

                                      c936b0c721b8bb0a41f9fac019dd29133b7f4032

                                      SHA256

                                      d0dfd7bfc872b738ccf4c098e05ac2d9e1632b6f7375bf0592d6d2a1ef5f0b1b

                                      SHA512

                                      15e94a48246991b34ad5bf1e8e801d66829316cd3cb8af53b7f1b8155bf7a029636bf1aac72de80b460508025e050353bd4d36bc08e127a3c3c5d103fa93fba8

                                    • C:\Users\Admin\AppData\Local\Temp\2d47ddc8-edd0-46b3-a279-bbd193e62c80.vbs

                                      Filesize

                                      486B

                                      MD5

                                      e50c38388df6ecde6808523b373af6e3

                                      SHA1

                                      9f5b9050f882be18937c25cff0cd4e2bede57e1b

                                      SHA256

                                      2271cfa8d487e3531a8e6ae03581c7811c3f3d651dc41c69b31fdde9b24f64af

                                      SHA512

                                      8c5347e0a0ebd2c5d4efaec8ba0ec806cae0aa91a987374fd510d1b742ed93e3794b57c394d39544babda9d892de604f5a3e188699be2b89ccedd5723fbe37d5

                                    • C:\Users\Admin\AppData\Local\Temp\2db4e8d0-1dea-4eee-bf5b-19fe82c5334b.vbs

                                      Filesize

                                      710B

                                      MD5

                                      a2f6ff4371405919f284c0639f8bd410

                                      SHA1

                                      b07f58ad313822e21348d772c65119c084a8b810

                                      SHA256

                                      840920a0fa67d1b055c49d7ec9e392934853c1ed530ec92f7f284fff8f7f26d6

                                      SHA512

                                      b1a1a7461b146cdd46329feb1a3bacadb43738bdc7fdcbdc97740641e7d38bf710dc36837d4aeb1b82dc0b2e0e06454eea4743924fe7208385cf5ff9acf60ff8

                                    • C:\Users\Admin\AppData\Local\Temp\61fa0062-b0ae-461b-abd8-5ef17ea01eb3.vbs

                                      Filesize

                                      710B

                                      MD5

                                      39582c950df4eaec52e71c0a8855f151

                                      SHA1

                                      46d68a274a1b46837cd7af2d6892d6493769c486

                                      SHA256

                                      7fa52f9cc171b59dc41bc1a709ec2285b2d745fbe6597e87fc80f2966981578b

                                      SHA512

                                      842e91ffd0223fc2a6ce6b6ab43a7d4a78604ff760c9217191ea5fbc8e5b4443aaddd43c12c11c960d39e901320bec026eb51d81daff14cc27be7957110a39d8

                                    • C:\Users\Admin\AppData\Local\Temp\68a6e94a-e80b-448c-952d-507cfdb96cc8.vbs

                                      Filesize

                                      710B

                                      MD5

                                      edf43bcb5251ae6b088d37b4f8d2614f

                                      SHA1

                                      4bfed9a0588e1dbbb3ffc8d6b5ab58774821a911

                                      SHA256

                                      cb4194c004e4135d0d6f7963e71919ed95ddeb218ba04cdbc83ff98a9d66d948

                                      SHA512

                                      94586987db8d6246f85b01585f0fd292a95c8e9991685b4914a4f2893f17a869a80f45f4819bb6e87fce859f4ce0bed4439033ab20cb1921548d8da7e80624e6

                                    • C:\Users\Admin\AppData\Local\Temp\8964e000-42e4-4ad6-b774-0942c9693e3b.vbs

                                      Filesize

                                      710B

                                      MD5

                                      7c3885b3876183c6169edab0535f9109

                                      SHA1

                                      aeab6daa47acc9b4180c4b0798def3ebdcc0f27e

                                      SHA256

                                      d6dcf8f25b4d37efa88be27100283f0c748be137a046dfbfd138f4100581641c

                                      SHA512

                                      42fc5214e407af8659a96183d40c99ebd96f9215c151f6cc82f354d7d3f28f37711062dfee220def6c4dac6248a83fad50154219de7527973109c1e94e607f79

                                    • C:\Users\Admin\AppData\Local\Temp\Xk1H8t4K12.bat

                                      Filesize

                                      199B

                                      MD5

                                      f860aac247db320023d33a9a8f58107c

                                      SHA1

                                      2d0b586a52e321779b5d5ef7fa1e82286b6c5f31

                                      SHA256

                                      2063c110f264a33f804f893e341b207181cff4b3c93f6a9b79ef0e4d4dcb1333

                                      SHA512

                                      9dd5b37a56bba32ddaca3ba0a8a633d904c813a5c656a38f6720543896bf0fc3efae6afbce021a98ce39eadc01bc37729c13d3f738e194a43a863b5bfc968db2

                                    • C:\Users\Admin\AppData\Local\Temp\bbc01160-5257-45a7-8a50-365748fe08d9.vbs

                                      Filesize

                                      710B

                                      MD5

                                      5c2b2ec511009b0b4c69f33e53bfda91

                                      SHA1

                                      abe8725a93dc3b405c28ce41ebf2ea3b8195823b

                                      SHA256

                                      c2f0155d10550c5c8c41946803d124c5b30df677dee960671c1e400967a937ba

                                      SHA512

                                      f3f8a18ee925ab310759039924c490ce03ffe58948fd9e0a5184e53ad9c161684c0b3cc3168979a36c3ab430936aad1a4f439a5088e8655a8c4c637a6626742d

                                    • C:\Users\Admin\AppData\Local\Temp\c593460a1cc26114da33333df493100821daf2d0.exe

                                      Filesize

                                      885KB

                                      MD5

                                      dae423dcdf77c3ee1f88cf6ad17ab009

                                      SHA1

                                      4a7233065af4168332305dacc5ea6e20088c5be0

                                      SHA256

                                      8a23a12980d5668acce474ea6202521536e29e8a8271803e6294508621f4849a

                                      SHA512

                                      1d9750063ecb5601415212783887e49a0aa752d770ceac3b7f98d04835540bda1d6d6e821baf9a5d17ff2771cc7a386541c7d0923bd74684848d4bfd263d95b5

                                    • C:\Users\Admin\AppData\Local\Temp\d1b556e7-9b18-4d35-bf93-e9ab22357907.vbs

                                      Filesize

                                      710B

                                      MD5

                                      dc9fec6cd13de6cd6a44e9849d637f17

                                      SHA1

                                      a1ba20d2e545b178ec3ffb0016c1951cb8602b67

                                      SHA256

                                      b1b926d7e0de4017edadd0b77d77b48f7ca2b613265ef28d07623e0daecbd93e

                                      SHA512

                                      f18ceea24c53104e11faf16191fc1e66d2dcd2e038147409b685e8702fffde714d3c5ccdbdcea252f3cc496f8229d4633aef943fabb61a92edb80fbb5ce06969

                                    • C:\Users\Admin\AppData\Local\Temp\dcf0915b-fe1f-45cd-84ce-8cd4b04b4dc6.vbs

                                      Filesize

                                      710B

                                      MD5

                                      f470b4178292c2cf7ed415476454f740

                                      SHA1

                                      520325ba86eaaba733ecdc6a25cab0f2979c45de

                                      SHA256

                                      e59d6041e0b4b77b555e053ffd59d59f43cb17413394e4bbffe8d4fafb4260d6

                                      SHA512

                                      075061677ff69e6bab018ddad5ea46f7f57d34a30a5ea4327509732af8299566f4b8ed244b1342d6aea3720360180e0b839440e9b64b6298f5b1b4a303fa3929

                                    • C:\Users\Admin\AppData\Local\Temp\ee050952-ac39-4d15-be92-b5640f54fc0c.vbs

                                      Filesize

                                      710B

                                      MD5

                                      c071593c15529c7c26130cf4d173f1e8

                                      SHA1

                                      b109647eaf8e0bc8c71372cc9dafbe13e559f3b1

                                      SHA256

                                      1af1549335697c21c281272dc7dba088a72546f253db523ed813d52897dbdd44

                                      SHA512

                                      21a23a28777422ef6edf3712af63f7ce4f505a729005bebd13c1067ddb4fc0b5bba10ab555d8b1d0d6908dbd66c75e011ce57ba8a5c19b7b176555182fef88e0

                                    • C:\Users\Default\RCX234A.tmp

                                      Filesize

                                      885KB

                                      MD5

                                      59ebe4463281c471b5318b76efc96ebc

                                      SHA1

                                      10e0f100669b44ea44a2b9e0b5c2821fe7052ea5

                                      SHA256

                                      1ebfd70768fabf2cd8a1b11b0e4f5fbb6f134799a9aba1bb3d4252eb6d64adda

                                      SHA512

                                      3fc9fb26262dd1324294eb78a75fd2ecc1d58e29dc89fb233e1cfba96b956bc1d3e40e92b251d3a32b276907d5ff8076091c573b72bb673bcaf9bc3e4fa1b9dd

                                    • memory/1680-256-0x0000000001140000-0x0000000001224000-memory.dmp

                                      Filesize

                                      912KB

                                    • memory/1684-3-0x0000000000370000-0x000000000038C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/1684-5-0x0000000000590000-0x00000000005A6000-memory.dmp

                                      Filesize

                                      88KB

                                    • memory/1684-4-0x0000000000150000-0x0000000000160000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1684-9-0x0000000000D70000-0x0000000000D7C000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/1684-7-0x00000000005C0000-0x00000000005CE000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/1684-6-0x00000000005B0000-0x00000000005BA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1684-1-0x0000000000DC0000-0x0000000000EA4000-memory.dmp

                                      Filesize

                                      912KB

                                    • memory/1684-0-0x000007FEF6423000-0x000007FEF6424000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1684-2-0x000007FEF6420000-0x000007FEF6E0C000-memory.dmp

                                      Filesize

                                      9.9MB

                                    • memory/1684-8-0x0000000000650000-0x0000000000658000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/1684-253-0x000007FEF6420000-0x000007FEF6E0C000-memory.dmp

                                      Filesize

                                      9.9MB

                                    • memory/1700-289-0x0000000001240000-0x0000000001324000-memory.dmp

                                      Filesize

                                      912KB

                                    • memory/1868-371-0x0000000001270000-0x0000000001354000-memory.dmp

                                      Filesize

                                      912KB

                                    • memory/2544-359-0x0000000001250000-0x0000000001334000-memory.dmp

                                      Filesize

                                      912KB

                                    • memory/2552-323-0x0000000001340000-0x0000000001424000-memory.dmp

                                      Filesize

                                      912KB

                                    • memory/2896-347-0x0000000000F50000-0x0000000001034000-memory.dmp

                                      Filesize

                                      912KB

                                    • memory/2912-335-0x00000000000D0000-0x00000000001B4000-memory.dmp

                                      Filesize

                                      912KB