Overview
overview
10Static
static
10c39e5e5773...fb.exe
windows7-x64
7c39e5e5773...fb.exe
windows10-2004-x64
7c3a61d282c...2f.exe
windows7-x64
7c3a61d282c...2f.exe
windows10-2004-x64
7c3aaa8d067...d1.exe
windows7-x64
10c3aaa8d067...d1.exe
windows10-2004-x64
10c40612db16...6d.exe
windows7-x64
10c40612db16...6d.exe
windows10-2004-x64
10c45000d072...99.exe
windows7-x64
10c45000d072...99.exe
windows10-2004-x64
10c4639b8ab9...97.exe
windows7-x64
10c4639b8ab9...97.exe
windows10-2004-x64
10c47cd91636...6d.exe
windows7-x64
1c47cd91636...6d.exe
windows10-2004-x64
1c486ed6acb...df.exe
windows7-x64
7c486ed6acb...df.exe
windows10-2004-x64
7c4b4c8152f...dc.exe
windows7-x64
10c4b4c8152f...dc.exe
windows10-2004-x64
10c4c197e502...e0.exe
windows7-x64
10c4c197e502...e0.exe
windows10-2004-x64
10c4ca622404...18.exe
windows7-x64
10c4ca622404...18.exe
windows10-2004-x64
10c50b533887...50.exe
windows7-x64
10c50b533887...50.exe
windows10-2004-x64
10c50b94cf52...6f.exe
windows7-x64
10c50b94cf52...6f.exe
windows10-2004-x64
10c520bfebf2...a2.exe
windows7-x64
8c520bfebf2...a2.exe
windows10-2004-x64
10c53059381a...48.exe
windows7-x64
10c53059381a...48.exe
windows10-2004-x64
10c59549cfc2...b8.exe
windows7-x64
1c59549cfc2...b8.exe
windows10-2004-x64
1Analysis
-
max time kernel
57s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
c39e5e577360a09a924844399e1953fb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c39e5e577360a09a924844399e1953fb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
c45000d07293154a655ba52ffb7bab99.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
c45000d07293154a655ba52ffb7bab99.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
c47cd916369fb96f0624e8c8a549946d.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
c47cd916369fb96f0624e8c8a549946d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
c486ed6acb598d864bd441b40bbb31df.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
c486ed6acb598d864bd441b40bbb31df.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
c4c197e50214b25100e10fb00b2ac6e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
c4c197e50214b25100e10fb00b2ac6e0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
c4ca622404b5b4763e20a205a41db518.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
c4ca622404b5b4763e20a205a41db518.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
c50b533887d2992f66c414bd95339750.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
c50b533887d2992f66c414bd95339750.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
c53059381a17db7f48cf6871b7869c48.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
c53059381a17db7f48cf6871b7869c48.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8.exe
Resource
win10v2004-20250314-en
General
-
Target
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
-
Size
1.6MB
-
MD5
5355cb64d0008d7ed7267cebea8f9bc4
-
SHA1
4f8fc970efa45c2f547e8583b49eb543b778f001
-
SHA256
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f
-
SHA512
cd662e6d9f215b18867056fe70d9b04b2eaf7090577546d038218dfe8716379654cb6e5f1c6ca3672e8bd1844d5e7810486164cf8fe99054305a89eb51b4bac6
-
SSDEEP
24576:Ksm8JijftfWIqZpyh/X6bSmV2GKz1oncoiF9GFwUvpHk3tSfEybcswrJ4gOEGEk:KD8Jijt+xpS/ekYmLGdhEAf7bCcjE
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3424 4964 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5628 4964 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4560 4964 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3904 4964 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4108 4964 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5960 4964 schtasks.exe 86 -
resource yara_rule behavioral26/memory/2744-1-0x0000000000520000-0x00000000006C2000-memory.dmp dcrat behavioral26/files/0x0010000000022f40-28.dat dcrat behavioral26/files/0x0009000000024273-47.dat dcrat behavioral26/memory/2156-96-0x0000000000560000-0x0000000000702000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 540 powershell.exe 5684 powershell.exe 2120 powershell.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation csrss.exe -
Executes dropped EXE 7 IoCs
pid Process 2156 csrss.exe 4236 csrss.exe 5392 csrss.exe 5608 csrss.exe 4028 csrss.exe 1708 csrss.exe 772 csrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings csrss.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5628 schtasks.exe 4560 schtasks.exe 3904 schtasks.exe 4108 schtasks.exe 5960 schtasks.exe 3424 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2744 c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe 2120 powershell.exe 5684 powershell.exe 5684 powershell.exe 540 powershell.exe 540 powershell.exe 2120 powershell.exe 2120 powershell.exe 5684 powershell.exe 540 powershell.exe 2156 csrss.exe 4236 csrss.exe 5392 csrss.exe 5608 csrss.exe 4028 csrss.exe 4028 csrss.exe 1708 csrss.exe 1708 csrss.exe 772 csrss.exe 772 csrss.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2744 c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe Token: SeDebugPrivilege 2120 powershell.exe Token: SeDebugPrivilege 540 powershell.exe Token: SeDebugPrivilege 5684 powershell.exe Token: SeDebugPrivilege 2156 csrss.exe Token: SeDebugPrivilege 4236 csrss.exe Token: SeDebugPrivilege 5392 csrss.exe Token: SeDebugPrivilege 5608 csrss.exe Token: SeDebugPrivilege 4028 csrss.exe Token: SeDebugPrivilege 1708 csrss.exe Token: SeDebugPrivilege 772 csrss.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2120 2744 c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe 93 PID 2744 wrote to memory of 2120 2744 c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe 93 PID 2744 wrote to memory of 5684 2744 c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe 94 PID 2744 wrote to memory of 5684 2744 c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe 94 PID 2744 wrote to memory of 540 2744 c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe 95 PID 2744 wrote to memory of 540 2744 c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe 95 PID 2744 wrote to memory of 548 2744 c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe 99 PID 2744 wrote to memory of 548 2744 c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe 99 PID 548 wrote to memory of 744 548 cmd.exe 101 PID 548 wrote to memory of 744 548 cmd.exe 101 PID 548 wrote to memory of 2156 548 cmd.exe 106 PID 548 wrote to memory of 2156 548 cmd.exe 106 PID 2156 wrote to memory of 4084 2156 csrss.exe 107 PID 2156 wrote to memory of 4084 2156 csrss.exe 107 PID 2156 wrote to memory of 400 2156 csrss.exe 108 PID 2156 wrote to memory of 400 2156 csrss.exe 108 PID 4084 wrote to memory of 4236 4084 WScript.exe 111 PID 4084 wrote to memory of 4236 4084 WScript.exe 111 PID 4236 wrote to memory of 3304 4236 csrss.exe 112 PID 4236 wrote to memory of 3304 4236 csrss.exe 112 PID 4236 wrote to memory of 5796 4236 csrss.exe 113 PID 4236 wrote to memory of 5796 4236 csrss.exe 113 PID 3304 wrote to memory of 5392 3304 WScript.exe 114 PID 3304 wrote to memory of 5392 3304 WScript.exe 114 PID 5392 wrote to memory of 2560 5392 csrss.exe 115 PID 5392 wrote to memory of 2560 5392 csrss.exe 115 PID 5392 wrote to memory of 1088 5392 csrss.exe 116 PID 5392 wrote to memory of 1088 5392 csrss.exe 116 PID 2560 wrote to memory of 5608 2560 WScript.exe 119 PID 2560 wrote to memory of 5608 2560 WScript.exe 119 PID 5608 wrote to memory of 4820 5608 csrss.exe 120 PID 5608 wrote to memory of 4820 5608 csrss.exe 120 PID 5608 wrote to memory of 4656 5608 csrss.exe 121 PID 5608 wrote to memory of 4656 5608 csrss.exe 121 PID 4820 wrote to memory of 4028 4820 WScript.exe 124 PID 4820 wrote to memory of 4028 4820 WScript.exe 124 PID 4028 wrote to memory of 3468 4028 csrss.exe 125 PID 4028 wrote to memory of 3468 4028 csrss.exe 125 PID 4028 wrote to memory of 5336 4028 csrss.exe 126 PID 4028 wrote to memory of 5336 4028 csrss.exe 126 PID 3468 wrote to memory of 1708 3468 WScript.exe 127 PID 3468 wrote to memory of 1708 3468 WScript.exe 127 PID 1708 wrote to memory of 2864 1708 csrss.exe 128 PID 1708 wrote to memory of 2864 1708 csrss.exe 128 PID 1708 wrote to memory of 5132 1708 csrss.exe 129 PID 1708 wrote to memory of 5132 1708 csrss.exe 129 PID 2864 wrote to memory of 772 2864 WScript.exe 130 PID 2864 wrote to memory of 772 2864 WScript.exe 130 PID 772 wrote to memory of 3004 772 csrss.exe 131 PID 772 wrote to memory of 3004 772 csrss.exe 131 PID 772 wrote to memory of 2412 772 csrss.exe 132 PID 772 wrote to memory of 2412 772 csrss.exe 132 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe"C:\Users\Admin\AppData\Local\Temp\c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\4d7dcf6448637544ea7e961be1ad\lsass.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bn9GlWlL3z.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:744
-
-
C:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exe"C:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1f758f0b-926b-4653-b59e-c48d80fb2b72.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exeC:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\78a732af-6137-4569-a47d-970b0b9f6d32.vbs"6⤵
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exeC:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5392 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\71b59fc2-42c2-45ad-aeee-6942f7e19afd.vbs"8⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exeC:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5608 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f2a9a8b8-539e-498e-a015-868b82d65299.vbs"10⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exeC:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bc58f238-a599-46c0-83a3-5039479f5be4.vbs"12⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exeC:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\52dfa592-1fa6-4137-a48c-b401cbe24fcf.vbs"14⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exeC:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3d3b772c-35c7-43f3-8210-01ecbc2c4096.vbs"16⤵PID:3004
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9db0c7b5-6d0d-445c-9758-d9b06c93ed04.vbs"16⤵PID:2412
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6d277c68-3baf-467d-9da3-ea119bc2ead3.vbs"14⤵PID:5132
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b1a505e9-315a-4498-a840-bc76d1713e42.vbs"12⤵PID:5336
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\087dccb4-309a-4be8-a7b9-5abab6b676b9.vbs"10⤵PID:4656
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d53e84de-acdc-4ae8-a8aa-8a1ede42c6e8.vbs"8⤵PID:1088
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f894063f-c48a-42d5-95a5-2cfcc7092d03.vbs"6⤵PID:5796
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\403c1dd5-8291-4c7c-9615-fec1187067ae.vbs"4⤵PID:400
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\4d7dcf6448637544ea7e961be1ad\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\4d7dcf6448637544ea7e961be1ad\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\4d7dcf6448637544ea7e961be1ad\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\4fc20efa2b2ad5aa4b35f8fcca90f7df\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD55355cb64d0008d7ed7267cebea8f9bc4
SHA14f8fc970efa45c2f547e8583b49eb543b778f001
SHA256c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f
SHA512cd662e6d9f215b18867056fe70d9b04b2eaf7090577546d038218dfe8716379654cb6e5f1c6ca3672e8bd1844d5e7810486164cf8fe99054305a89eb51b4bac6
-
Filesize
1.6MB
MD5a54d303f6940e00427fda31a002b4496
SHA1c2c405135c2b4f7e4b7822e2bdd8399b45019b01
SHA256c44706ffd98e77eb8a959eb3631ae831e145046bbd6ca5ede98b8fe907b367c6
SHA5125687eb5fb1ddc7650f7c34c15883ccde587efff616a1800eb0c48314ad530a2ae31222f238cd4083bb53c67fe4913c41a9f13172f54be0ebb42410f2f2633a01
-
Filesize
1KB
MD53690a1c3b695227a38625dcf27bd6dac
SHA1c2ed91e98b120681182904fa2c7cd504e5c4b2f5
SHA2562ca8df156dba033c5b3ae4009e3be14dcdc6b9be53588055efd0864a1ab8ff73
SHA51215ebfe05c0317f844e957ac02842a60b01f00ddca981e888e547056d0e30c97829bc4a2a46ce43034b3346f7cf5406c7c41c2a830f0abc47c8d2fd2ef00cb2c1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD551fc9f46ed7a5fbec980d47049731eac
SHA11811612998c800bb4563742c4760b2ab3a5e2677
SHA25616c05848744983bd75fe403c1aa3aded96c6baf10b77fe95d9f4b52d8422daac
SHA512e55ea8fe57f30d236b3ba8cd327e53dac090bb71ef7899b536a4acccd997a6aa232d9b80e0995a536975aeb13cfe29eda27b630393683e3825660224d96b8a15
-
Filesize
944B
MD5454c5c4b128d34aee2eb765f2a9c0aa9
SHA14b6e92db79d964f604fd6b261b3b19ede2aea8a5
SHA256e1e65d1697b9ac59805f677cbc8eec623a899b75b1389354f0948ad3c1513772
SHA51217b4e146ef4f8862d06ac975204cca9ef9b077420256df92d94409715b18efb4dc63879154c1c234317a169ac63024ed43b5cb52473882dc46c588af089f25d6
-
Filesize
721B
MD5fd5b35cd2c8bd2e85e742b6bf09ece11
SHA1347f83d683f1bc7472922e8828ac28863e9b5d41
SHA2563a8c8aa4759ab2fb431c9626e2bb4df6f872532d970e37828974b781acddceb9
SHA51215e05fd7221bd2bbd1a7e9320643ff048081b9464d1f249fdbf2fea496a5c182bcb9c63f3cfb02efed9bcb0e3a1b2af0787bd68c34350aaef7f7250fd283fc6d
-
Filesize
720B
MD5fb3af12eddc05631f57421b53eafcdd0
SHA19c53effd1a59fa2b8237c3e4658c1c1ae0c5aa34
SHA256647abbb592fc667249a9860f78b11ef8f27845120a76b62fa9fa84fda538ac0c
SHA512885b8914ec9073fb6e9f4b4620fcbc08b8058c7bbfe23774c02f66ade0430fbf680c4280608b27472743f790983099feaa3eb86911b2c000de85d58138e1d1f8
-
Filesize
497B
MD55cb396b20428c22fa82c39126c7b7f1c
SHA1d07d08f0beeb2d226a3d00a9f8932900a1a9b0e7
SHA256c71199e97ab29f9b7a547db32f93c0c51dd767e15d6d3dfee9ac19d82831f95b
SHA512e8ecb9eed76ed0d2b6b5987db7aaee32af696b38cb6b3d750c4b2a877829c35d7da9b97dc46ab0416bc5b9517677f60e89d42e6dfdf6d9aab1a15693031f6f51
-
Filesize
721B
MD581bba9d6dc929a9837b9ca6a2a9ba0dd
SHA119e08f8502c695251a3bbc4942b52d2de6852973
SHA256c95f8bafba32474e51eb2edaf864d6bd13b25b5ea1a97f242082ee6258f29d38
SHA5125177da28d4cba2141cc3b5569a74a509d0ccf2faa6c06b8f841391e15232b7b57adc7bec4a190922ff03d0e5e16687be1c91b3f5caaae28d0aa53e32278ff8bf
-
Filesize
721B
MD5a2ca04daccaea3487c0ac7c095cb0bd6
SHA1f1542851eb8e6dd687cac412974fc8255b194fd5
SHA25626dc7594595c1807fe409151063a392ae791f8650c2de823bee8e0428effd149
SHA512ee6cbae52c80052b680d90c4bc082b9a0f1edee7c771cfecb3cc62d331072de28fbe2a2e651856625504b5b30c2bd023f02cdcbb724416a9d7b205f3c48b9370
-
Filesize
721B
MD5070c1117d541cb2c223351c1c7e6b050
SHA17e8f56a12d22f61aee6b6d30b83b3358eaefda92
SHA256750cc36b68b02a59e37de04215e0a0dc8855d78a1f3da426852f659a7418395c
SHA512373877b458a3e2d6f874acd657411b2a9b7585536b7796a1d477656316aca61094db2b3cbce8d5f1e8b742f0a58138d416393ba6f69e6c4a7bf96b46e1547b68
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
721B
MD579a2e71f16a22c4a8e4ff51754aa2bc6
SHA1f9f1eff298d813e858ec4e295fe46f1897d7a3d8
SHA256a39288ca8643f127f6d140f52ce6bec6dc730fd742b625bc3e6085b45b08d79e
SHA512359ad85fce741febc3ddf4c239f9f5b0cfcd353412a69e220c12d190a7b3cb42a6d4a2a6e6c28cd7c4ba589be77df9552e73d618db3a34ac317ada2c9b2a0f79
-
Filesize
210B
MD522755ba5cb7d59600249fdb348050143
SHA1eb1e20a1c3ebda4461d3a3d217fd53f974a7c3dc
SHA256c159a2ab1b3fcd09c5b12b32aa9f3d69215b2e4f746b4e39a90792b572a23abb
SHA512b6e1695efe5748b562b769eba606246f9f830101cc685fe911cef283aeb7ab45901c17862cc02ace286fcbfa3bd46df971ee64566032f6deca1fbd74dac7e79b
-
Filesize
721B
MD56cdb2d607589748840c65eb68f144df8
SHA1ffebd49280f9c4a55651f06d84d4ed043b37a831
SHA25630b4b54c0d7e85c7866917d7dc777bd67fd6b02ae8dadb06976c93b1ab2b715e
SHA512eb096409028e4d68dea18860d5601dbc9de11a290c338a2eafe81d5c3cd05b6a00fda463a29bae1ee40436dd07acb9bc7981a0d453003ac21e6ad54d3b68ca04