Overview
overview
10Static
static
10c39e5e5773...fb.exe
windows7-x64
7c39e5e5773...fb.exe
windows10-2004-x64
7c3a61d282c...2f.exe
windows7-x64
7c3a61d282c...2f.exe
windows10-2004-x64
7c3aaa8d067...d1.exe
windows7-x64
10c3aaa8d067...d1.exe
windows10-2004-x64
10c40612db16...6d.exe
windows7-x64
10c40612db16...6d.exe
windows10-2004-x64
10c45000d072...99.exe
windows7-x64
10c45000d072...99.exe
windows10-2004-x64
10c4639b8ab9...97.exe
windows7-x64
10c4639b8ab9...97.exe
windows10-2004-x64
10c47cd91636...6d.exe
windows7-x64
1c47cd91636...6d.exe
windows10-2004-x64
1c486ed6acb...df.exe
windows7-x64
7c486ed6acb...df.exe
windows10-2004-x64
7c4b4c8152f...dc.exe
windows7-x64
10c4b4c8152f...dc.exe
windows10-2004-x64
10c4c197e502...e0.exe
windows7-x64
10c4c197e502...e0.exe
windows10-2004-x64
10c4ca622404...18.exe
windows7-x64
10c4ca622404...18.exe
windows10-2004-x64
10c50b533887...50.exe
windows7-x64
10c50b533887...50.exe
windows10-2004-x64
10c50b94cf52...6f.exe
windows7-x64
10c50b94cf52...6f.exe
windows10-2004-x64
10c520bfebf2...a2.exe
windows7-x64
8c520bfebf2...a2.exe
windows10-2004-x64
10c53059381a...48.exe
windows7-x64
10c53059381a...48.exe
windows10-2004-x64
10c59549cfc2...b8.exe
windows7-x64
1c59549cfc2...b8.exe
windows10-2004-x64
1Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
c39e5e577360a09a924844399e1953fb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c39e5e577360a09a924844399e1953fb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
c45000d07293154a655ba52ffb7bab99.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
c45000d07293154a655ba52ffb7bab99.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
c47cd916369fb96f0624e8c8a549946d.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
c47cd916369fb96f0624e8c8a549946d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
c486ed6acb598d864bd441b40bbb31df.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
c486ed6acb598d864bd441b40bbb31df.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
c4c197e50214b25100e10fb00b2ac6e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
c4c197e50214b25100e10fb00b2ac6e0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
c4ca622404b5b4763e20a205a41db518.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
c4ca622404b5b4763e20a205a41db518.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
c50b533887d2992f66c414bd95339750.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
c50b533887d2992f66c414bd95339750.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
c53059381a17db7f48cf6871b7869c48.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
c53059381a17db7f48cf6871b7869c48.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8.exe
Resource
win10v2004-20250314-en
General
-
Target
c45000d07293154a655ba52ffb7bab99.exe
-
Size
849KB
-
MD5
c45000d07293154a655ba52ffb7bab99
-
SHA1
4b4fbc2c00cf6c6c6fcea58074213c4f0606b80a
-
SHA256
f639fc426671cba387b08b8c14743bccfd9d13866982573a1ed2e150967c17ac
-
SHA512
2805351e0080a62061efb9bc7e3d953221df1180edfcf1142b59302a0afbcf3332a8855deaa9f147ebb11789a3cdbadf6073306000d03698537813bf579df674
-
SSDEEP
12288:I6NE5ig5Fttrh5PxjUm5SvDdLILaBFkjKuAMx6A5gtbGk84Ca04jtiPBgGKYTx:I6N297PxbsKtC5AHgk
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 42 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5772 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4388 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5676 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4508 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4780 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4528 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4292 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1852 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5320 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2408 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4232 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3112 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4756 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4760 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4888 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4476 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4932 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4964 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4584 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4652 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4688 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4548 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4788 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4820 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5812 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4568 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4836 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4852 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4868 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3188 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 408 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4556 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4264 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3356 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5272 4140 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4240 4140 schtasks.exe 88 -
resource yara_rule behavioral10/memory/116-1-0x0000000000030000-0x000000000010A000-memory.dmp dcrat behavioral10/files/0x00080000000242c6-18.dat dcrat behavioral10/files/0x000c00000002431a-87.dat dcrat behavioral10/files/0x000a0000000242fc-156.dat dcrat behavioral10/files/0x0009000000024305-167.dat dcrat behavioral10/files/0x000700000002431f-178.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation c45000d07293154a655ba52ffb7bab99.exe -
Executes dropped EXE 1 IoCs
pid Process 3428 wininit.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Shared Gadgets\886983d96e3d3e c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files\Java\jre-1.8\bin\6ccacd8608530f c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\csrss.exe c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\RCX848F.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\edge_BITS_4428_655744444\RCX8710.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\edge_BITS_4428_655744444\smss.exe c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\Registry.exe c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files\edge_BITS_4428_655744444\smss.exe c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files\edge_BITS_4428_655744444\69ddcba757bf72 c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files\Windows Defender\ja-JP\ee2ad38f3d4382 c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\RCX848E.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\RCX9546.tmp c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files (x86)\Windows Media Player\en-US\66fc9ff0ee96c2 c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\RCX7DE1.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\RCX8005.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\sihost.exe c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\edge_BITS_4428_655744444\RCX8711.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\RCX9545.tmp c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files (x86)\Windows Media Player\en-US\sihost.exe c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files\Java\jre-1.8\bin\Idle.exe c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files\Windows Defender\ja-JP\Registry.exe c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\RCX7E01.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\RCX8074.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\Idle.exe c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\csrss.exe c45000d07293154a655ba52ffb7bab99.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Tasks\sysmon.exe c45000d07293154a655ba52ffb7bab99.exe File created C:\Windows\Tasks\121e5b5079f7c0 c45000d07293154a655ba52ffb7bab99.exe File created C:\Windows\GameBarPresenceWriter\TextInputHost.exe c45000d07293154a655ba52ffb7bab99.exe File created C:\Windows\GameBarPresenceWriter\22eafd247d37c3 c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Windows\Tasks\RCX8916.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Windows\Tasks\RCX8917.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Windows\GameBarPresenceWriter\TextInputHost.exe c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Windows\Tasks\sysmon.exe c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Windows\GameBarPresenceWriter\RCX9030.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Windows\GameBarPresenceWriter\RCX909F.tmp c45000d07293154a655ba52ffb7bab99.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c45000d07293154a655ba52ffb7bab99.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2888 schtasks.exe 4508 schtasks.exe 4232 schtasks.exe 4584 schtasks.exe 4568 schtasks.exe 3356 schtasks.exe 4528 schtasks.exe 4688 schtasks.exe 4240 schtasks.exe 5676 schtasks.exe 2024 schtasks.exe 4964 schtasks.exe 2020 schtasks.exe 4780 schtasks.exe 4292 schtasks.exe 4888 schtasks.exe 4548 schtasks.exe 5812 schtasks.exe 1888 schtasks.exe 4556 schtasks.exe 4820 schtasks.exe 2408 schtasks.exe 4756 schtasks.exe 4788 schtasks.exe 4868 schtasks.exe 408 schtasks.exe 5272 schtasks.exe 4388 schtasks.exe 1904 schtasks.exe 4476 schtasks.exe 4652 schtasks.exe 2820 schtasks.exe 4932 schtasks.exe 4836 schtasks.exe 4852 schtasks.exe 3188 schtasks.exe 4264 schtasks.exe 5772 schtasks.exe 1852 schtasks.exe 5320 schtasks.exe 3112 schtasks.exe 4760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 116 c45000d07293154a655ba52ffb7bab99.exe 3428 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 116 c45000d07293154a655ba52ffb7bab99.exe Token: SeDebugPrivilege 3428 wininit.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 116 wrote to memory of 3428 116 c45000d07293154a655ba52ffb7bab99.exe 135 PID 116 wrote to memory of 3428 116 c45000d07293154a655ba52ffb7bab99.exe 135 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45000d07293154a655ba52ffb7bab99.exe"C:\Users\Admin\AppData\Local\Temp\c45000d07293154a655ba52ffb7bab99.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Public\AccountPictures\wininit.exe"C:\Users\Public\AccountPictures\wininit.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\d25f591a00514bc9ba8441\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\d25f591a00514bc9ba8441\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\d25f591a00514bc9ba8441\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\d25f591a00514bc9ba8441\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\d25f591a00514bc9ba8441\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\d25f591a00514bc9ba8441\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Media Player\en-US\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\en-US\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Media Player\en-US\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Users\Public\AccountPictures\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Users\Public\AccountPictures\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files\Java\jre-1.8\bin\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Java\jre-1.8\bin\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files\Java\jre-1.8\bin\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files\edge_BITS_4428_655744444\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\edge_BITS_4428_655744444\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files\edge_BITS_4428_655744444\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 14 /tr "'C:\Windows\Tasks\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\Tasks\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Windows\Tasks\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c45000d07293154a655ba52ffb7bab99c" /sc MINUTE /mo 6 /tr "'C:\7e20f84d5244aba7145631d4073af8\c45000d07293154a655ba52ffb7bab99.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c45000d07293154a655ba52ffb7bab99" /sc ONLOGON /tr "'C:\7e20f84d5244aba7145631d4073af8\c45000d07293154a655ba52ffb7bab99.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c45000d07293154a655ba52ffb7bab99c" /sc MINUTE /mo 12 /tr "'C:\7e20f84d5244aba7145631d4073af8\c45000d07293154a655ba52ffb7bab99.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 7 /tr "'C:\Windows\GameBarPresenceWriter\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\GameBarPresenceWriter\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Windows\GameBarPresenceWriter\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Users\Public\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Public\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Users\Public\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Defender\ja-JP\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\ja-JP\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Defender\ja-JP\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c45000d07293154a655ba52ffb7bab99c" /sc MINUTE /mo 11 /tr "'C:\d25f591a00514bc9ba8441\c45000d07293154a655ba52ffb7bab99.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c45000d07293154a655ba52ffb7bab99" /sc ONLOGON /tr "'C:\d25f591a00514bc9ba8441\c45000d07293154a655ba52ffb7bab99.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c45000d07293154a655ba52ffb7bab99c" /sc MINUTE /mo 8 /tr "'C:\d25f591a00514bc9ba8441\c45000d07293154a655ba52ffb7bab99.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
849KB
MD5b6bfe804ab9d0d373507d0007d4a0b0f
SHA1a98e8a582966d18dff0bf5f7c399b82b5ca470b7
SHA2561173195745d87acee2897512e92f7256cf5cef442486d738662e83a3a041e086
SHA5129db0e723f5cddec1ce8436b1f35e96253da24b8494011372d3af8415f7e09a868e5768947642183069b19ce3d705bcb7740259fbd57aea990a7ab8ce19c6da2f
-
Filesize
849KB
MD590eb081a63a1ebfc2ad103fd081fc8ff
SHA18c045be4ecba6ef5f90a342c6096509c045e1fc5
SHA256c90dd628013192fdfe9b2f9922388267d2aa8da11918cddecc1e4338c1b033f2
SHA5127b0edbc33977ec9b674cbbcaee2c13ad45017b9402660234b64668d64cecadc9701ff85ed41316b5fb932025e499490faf2ce0416c7594b31c022ad8a529e32a
-
Filesize
849KB
MD5c45000d07293154a655ba52ffb7bab99
SHA14b4fbc2c00cf6c6c6fcea58074213c4f0606b80a
SHA256f639fc426671cba387b08b8c14743bccfd9d13866982573a1ed2e150967c17ac
SHA5122805351e0080a62061efb9bc7e3d953221df1180edfcf1142b59302a0afbcf3332a8855deaa9f147ebb11789a3cdbadf6073306000d03698537813bf579df674
-
Filesize
849KB
MD5ad676ed77b73569f70392209ed147af3
SHA18218067a3307c14c6271abf8fd4e057fce6db30a
SHA2565b4c475fc6ff7e38616a4c7925459c161e323724826098568c1a6b7f031ba8ea
SHA5123b105ef4a80cdfb5bac4b2c4e965672a8cbe8bc4c7d42ce88bc94bc7df3bdc99c9bc0b9dd3a72ceb19785d56baf2f104ddbd5691b63ff5c3916494b18b5a8029
-
Filesize
849KB
MD54a156ba392e913de882ef9ae4c749387
SHA1b779acd73c053975a2967d45a52cec9c02e244f7
SHA256b7815653f5e1bae72bd87a0f8e1a0a8859bcfdd40fcf13bac212a10f7b1d34c6
SHA512a8b90bcf30f7aaf30ae16dc4c7b47bed8d85c9afee4963998e8d96f3c04de53d055fe8cfab8a4a5afa37edd19d6aa55177e265a733b8fbcbd571ca6331db15cf