Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1090ed1454b8...38.exe
windows7-x64
1090ed1454b8...38.exe
windows10-2004-x64
1091570920da...cf.exe
windows7-x64
1091570920da...cf.exe
windows10-2004-x64
7915c452bf2...b6.exe
windows7-x64
10915c452bf2...b6.exe
windows10-2004-x64
10916cd92d3a...38.exe
windows7-x64
10916cd92d3a...38.exe
windows10-2004-x64
10916fbe67a7...e3.exe
windows7-x64
10916fbe67a7...e3.exe
windows10-2004-x64
1091cce1a9f4...6a.exe
windows7-x64
1091cce1a9f4...6a.exe
windows10-2004-x64
1091d2e3f758...f6.exe
windows7-x64
1091d2e3f758...f6.exe
windows10-2004-x64
1091d7fa8d89...52.exe
windows7-x64
1091d7fa8d89...52.exe
windows10-2004-x64
1091e6d47bd8...cc.exe
windows7-x64
791e6d47bd8...cc.exe
windows10-2004-x64
792105c7a3b...24.exe
windows7-x64
792105c7a3b...24.exe
windows10-2004-x64
7921421b7f5...09.exe
windows7-x64
10921421b7f5...09.exe
windows10-2004-x64
109221b9eea3...3c.exe
windows7-x64
19221b9eea3...3c.exe
windows10-2004-x64
1092324d5776...05.exe
windows7-x64
192324d5776...05.exe
windows10-2004-x64
1927cd0bd1a...b8.exe
windows7-x64
3927cd0bd1a...b8.exe
windows10-2004-x64
392efd55895...78.exe
windows7-x64
1092efd55895...78.exe
windows10-2004-x64
10932a9096cd...eb.exe
windows7-x64
10932a9096cd...eb.exe
windows10-2004-x64
10Analysis
-
max time kernel
30s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:14
Behavioral task
behavioral1
Sample
90ed1454b881cba4ecd9b651325d4638.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
90ed1454b881cba4ecd9b651325d4638.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
91570920daa6ee3c5d03da7664cb620ac5be5038ac64a295811ed8349b5d3dcf.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
91570920daa6ee3c5d03da7664cb620ac5be5038ac64a295811ed8349b5d3dcf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
915c452bf258459048ef8813fe2586a7b3c85ae7438fcd9bfa6da3a4017a08b6.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
915c452bf258459048ef8813fe2586a7b3c85ae7438fcd9bfa6da3a4017a08b6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
916cd92d3ac28dded1335ac06764e138.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
916cd92d3ac28dded1335ac06764e138.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
916fbe67a7968d2b65d54ae3ce72f3e3.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
916fbe67a7968d2b65d54ae3ce72f3e3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
91cce1a9f4562b0cd73d60203cebb76a.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
91cce1a9f4562b0cd73d60203cebb76a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
91d2e3f758fbb2c6c8e7b069bd3ac7a4d68e4f9dea0e71ff60bdbcd2ac9dd4f6.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
91d2e3f758fbb2c6c8e7b069bd3ac7a4d68e4f9dea0e71ff60bdbcd2ac9dd4f6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
91d7fa8d891f603b35c77da7fcc4c552.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
91d7fa8d891f603b35c77da7fcc4c552.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
91e6d47bd804e58a4e160993dfdfc3cc.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
91e6d47bd804e58a4e160993dfdfc3cc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
92105c7a3b72655063939b49b38e6567d6703ed95f694cab2247bd9832706524.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
92105c7a3b72655063939b49b38e6567d6703ed95f694cab2247bd9832706524.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
921421b7f5be88eb661517835c090cd8a2fdcdfc69154d129c70ffa36da54809.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
921421b7f5be88eb661517835c090cd8a2fdcdfc69154d129c70ffa36da54809.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
9221b9eea367a2434dacd850f7b30b3c.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
9221b9eea367a2434dacd850f7b30b3c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
92324d5776518f262a2ce8bfd8c6856500a9c454b9a8b688810f604111532e05.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
92324d5776518f262a2ce8bfd8c6856500a9c454b9a8b688810f604111532e05.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
927cd0bd1a26a2158a18e48e682ba3b8.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
927cd0bd1a26a2158a18e48e682ba3b8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
92efd55895cd60b5057f3fb06ad84c78.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
92efd55895cd60b5057f3fb06ad84c78.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
932a9096cd16630970f2bdc5e6cb9aeb.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
932a9096cd16630970f2bdc5e6cb9aeb.exe
Resource
win10v2004-20250314-en
General
-
Target
91d7fa8d891f603b35c77da7fcc4c552.exe
-
Size
1.1MB
-
MD5
91d7fa8d891f603b35c77da7fcc4c552
-
SHA1
1b241b597c2d0b386e42f25e1e22372265ff06c6
-
SHA256
2ff54b9f6860a5d362ef776360ed7a7f3c4da0f1dfce7493caa631e50c87722c
-
SHA512
27cb44233fed4fd6aadd8f1100501ced417614a80a3e74bec5e3ff6d9c73bb7ed85b1885dc129a4f633738e489a85aac980b7238abef0ea10bdcb0df59d0a735
-
SSDEEP
12288:Z49I/nL8TnKZPVHR3E/bS2vkRNJLXseJQdErvNKj6SKm+eAIhu181d6rsPH:ZngTKZ5RU/xG7zsEyEve6SZ+dIe8usv
Malware Config
Signatures
-
DcRat 6 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 91d7fa8d891f603b35c77da7fcc4c552.exe 2768 schtasks.exe 2964 schtasks.exe 2788 schtasks.exe 2764 schtasks.exe 2776 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 5 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2768 2864 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2964 2864 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2788 2864 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2764 2864 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2864 schtasks.exe 29 -
UAC bypass 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe -
resource yara_rule behavioral15/memory/2824-1-0x0000000000BB0000-0x0000000000CC6000-memory.dmp dcrat behavioral15/files/0x000500000001a438-16.dat dcrat behavioral15/files/0x000700000001a0b6-54.dat dcrat behavioral15/files/0x000800000001a469-115.dat dcrat behavioral15/memory/1516-117-0x0000000000C90000-0x0000000000DA6000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1624 powershell.exe 1936 powershell.exe 2364 powershell.exe 1500 powershell.exe 932 powershell.exe 784 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1516 wininit.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\PerfLogs\\Admin\\sppsvc.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\System32\\PhotoScreensaver\\wininit.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\Temp\\Crashpad\\attachments\\wininit.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Windows\\System32\\VBICodec\\sppsvc.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Esl\\dllhost.exe\"" 91d7fa8d891f603b35c77da7fcc4c552.exe -
Checks whether UAC is enabled 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 91d7fa8d891f603b35c77da7fcc4c552.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\System32\PhotoScreensaver\wininit.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\VBICodec\RCX25B3.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\System32\PhotoScreensaver\wininit.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\PhotoScreensaver\RCX210D.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\VBICodec\RCX25A2.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\VBICodec\sppsvc.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\System32\PhotoScreensaver\56085415360792 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\System32\VBICodec\sppsvc.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Windows\System32\VBICodec\0a1fd5f707cd16 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Windows\System32\PhotoScreensaver\RCX208F.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Reader 9.0\Esl\dllhost.exe 91d7fa8d891f603b35c77da7fcc4c552.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Esl\5940a34987c991 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\RCX27C6.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\RCX27C7.tmp 91d7fa8d891f603b35c77da7fcc4c552.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\dllhost.exe 91d7fa8d891f603b35c77da7fcc4c552.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2964 schtasks.exe 2788 schtasks.exe 2764 schtasks.exe 2776 schtasks.exe 2768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 1500 powershell.exe 932 powershell.exe 1936 powershell.exe 1624 powershell.exe 784 powershell.exe 2364 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2824 91d7fa8d891f603b35c77da7fcc4c552.exe Token: SeDebugPrivilege 1500 powershell.exe Token: SeDebugPrivilege 932 powershell.exe Token: SeDebugPrivilege 1936 powershell.exe Token: SeDebugPrivilege 1624 powershell.exe Token: SeDebugPrivilege 784 powershell.exe Token: SeDebugPrivilege 2364 powershell.exe Token: SeDebugPrivilege 1516 wininit.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2824 wrote to memory of 1624 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 35 PID 2824 wrote to memory of 1624 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 35 PID 2824 wrote to memory of 1624 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 35 PID 2824 wrote to memory of 1936 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 36 PID 2824 wrote to memory of 1936 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 36 PID 2824 wrote to memory of 1936 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 36 PID 2824 wrote to memory of 2364 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 37 PID 2824 wrote to memory of 2364 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 37 PID 2824 wrote to memory of 2364 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 37 PID 2824 wrote to memory of 1500 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 38 PID 2824 wrote to memory of 1500 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 38 PID 2824 wrote to memory of 1500 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 38 PID 2824 wrote to memory of 932 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 39 PID 2824 wrote to memory of 932 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 39 PID 2824 wrote to memory of 932 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 39 PID 2824 wrote to memory of 784 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 40 PID 2824 wrote to memory of 784 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 40 PID 2824 wrote to memory of 784 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 40 PID 2824 wrote to memory of 1784 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 47 PID 2824 wrote to memory of 1784 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 47 PID 2824 wrote to memory of 1784 2824 91d7fa8d891f603b35c77da7fcc4c552.exe 47 PID 1784 wrote to memory of 2536 1784 cmd.exe 49 PID 1784 wrote to memory of 2536 1784 cmd.exe 49 PID 1784 wrote to memory of 2536 1784 cmd.exe 49 PID 1784 wrote to memory of 1516 1784 cmd.exe 50 PID 1784 wrote to memory of 1516 1784 cmd.exe 50 PID 1784 wrote to memory of 1516 1784 cmd.exe 50 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 91d7fa8d891f603b35c77da7fcc4c552.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\91d7fa8d891f603b35c77da7fcc4c552.exe"C:\Users\Admin\AppData\Local\Temp\91d7fa8d891f603b35c77da7fcc4c552.exe"1⤵
- DcRat
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2824 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\91d7fa8d891f603b35c77da7fcc4c552.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\PerfLogs\Admin\sppsvc.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\PhotoScreensaver\wininit.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Temp\Crashpad\attachments\wininit.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\VBICodec\sppsvc.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Reader 9.0\Esl\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4xHodhXOvU.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2536
-
-
C:\Windows\System32\PhotoScreensaver\wininit.exe"C:\Windows\System32\PhotoScreensaver\wininit.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1516
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\PerfLogs\Admin\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\PhotoScreensaver\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\Temp\Crashpad\attachments\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\System32\VBICodec\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Esl\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD591d7fa8d891f603b35c77da7fcc4c552
SHA11b241b597c2d0b386e42f25e1e22372265ff06c6
SHA2562ff54b9f6860a5d362ef776360ed7a7f3c4da0f1dfce7493caa631e50c87722c
SHA51227cb44233fed4fd6aadd8f1100501ced417614a80a3e74bec5e3ff6d9c73bb7ed85b1885dc129a4f633738e489a85aac980b7238abef0ea10bdcb0df59d0a735
-
Filesize
212B
MD57b09b1e60feec5c5212b86fc80ed81cc
SHA14c0d85e7e7f1f878c282c66a0f3aa5c8691a4512
SHA2568d377f422781a03c9fa5c05e27d9194edd75780fcd5c723d4f61f0a77c91e798
SHA512dd47651edf58a86a54b685ecfed5ed461a5706b8b3112c399441bb758c602a067af8f080979a82379e71e48df5819accc030d4595e4441a140920c62532a0080
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c6663448a6518b82b3c46726f068f2d6
SHA1604ae336fbe94b4f2aa8fa9cf342f86e77f4b3b3
SHA256ddd96247f5fae1bf84d09f09fef3310d574346596f06d1db298d144ade390d9b
SHA512eb78878707c9a7f368085b3e091e55fdfc8f777937c5d6b15d3ff437a46ee0e5f21bb6859d4df21f83fd770c51c1f0359f7c7ef7bb8f87dc01d5ef935114bfc6
-
Filesize
1.1MB
MD5c9581eddfa6de15b27ba020b4da7b2ca
SHA14b93972617af567a4f16c6c30fa4796f8992500b
SHA256bd82f89451dc5e0332144b993245dac3ed41bc6af686f3d09c9e2b07b7a94f0e
SHA51222187d814eef3fe108b5fad70cb290022e374bdc95a2699e6b23f31b0c20b7b3c0ec797be327e5abd13971a3d7bf48c1bfd13620dd02e54d292b124feb82688a
-
Filesize
1.1MB
MD504a4ed4d8500dfab64b52f9c10100ef2
SHA1a86749dd1b8a7c34753241c84d864c21dbd5b78e
SHA25605a139535b5d22f2d2e9f75ba2c5abf296ff01d60cd68ddefc4133673b80a6ee
SHA512c841bb1292b7001377263b805955cfce0f500af20d8dbad03a4294b6f67c667dd6d9c0708895d3534c7da8497c12c2d0266ac1b94f6a6b1840894c25c645350e