Overview
overview
10Static
static
10c39e5e5773...fb.exe
windows7-x64
7c39e5e5773...fb.exe
windows10-2004-x64
7c3a61d282c...2f.exe
windows7-x64
7c3a61d282c...2f.exe
windows10-2004-x64
7c3aaa8d067...d1.exe
windows7-x64
10c3aaa8d067...d1.exe
windows10-2004-x64
10c40612db16...6d.exe
windows7-x64
10c40612db16...6d.exe
windows10-2004-x64
10c45000d072...99.exe
windows7-x64
10c45000d072...99.exe
windows10-2004-x64
10c4639b8ab9...97.exe
windows7-x64
10c4639b8ab9...97.exe
windows10-2004-x64
10c47cd91636...6d.exe
windows7-x64
1c47cd91636...6d.exe
windows10-2004-x64
1c486ed6acb...df.exe
windows7-x64
7c486ed6acb...df.exe
windows10-2004-x64
7c4b4c8152f...dc.exe
windows7-x64
10c4b4c8152f...dc.exe
windows10-2004-x64
10c4c197e502...e0.exe
windows7-x64
10c4c197e502...e0.exe
windows10-2004-x64
10c4ca622404...18.exe
windows7-x64
10c4ca622404...18.exe
windows10-2004-x64
10c50b533887...50.exe
windows7-x64
10c50b533887...50.exe
windows10-2004-x64
10c50b94cf52...6f.exe
windows7-x64
10c50b94cf52...6f.exe
windows10-2004-x64
10c520bfebf2...a2.exe
windows7-x64
8c520bfebf2...a2.exe
windows10-2004-x64
10c53059381a...48.exe
windows7-x64
10c53059381a...48.exe
windows10-2004-x64
10c59549cfc2...b8.exe
windows7-x64
1c59549cfc2...b8.exe
windows10-2004-x64
1Analysis
-
max time kernel
43s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
c39e5e577360a09a924844399e1953fb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c39e5e577360a09a924844399e1953fb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
c45000d07293154a655ba52ffb7bab99.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
c45000d07293154a655ba52ffb7bab99.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
c47cd916369fb96f0624e8c8a549946d.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
c47cd916369fb96f0624e8c8a549946d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
c486ed6acb598d864bd441b40bbb31df.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
c486ed6acb598d864bd441b40bbb31df.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
c4c197e50214b25100e10fb00b2ac6e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
c4c197e50214b25100e10fb00b2ac6e0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
c4ca622404b5b4763e20a205a41db518.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
c4ca622404b5b4763e20a205a41db518.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
c50b533887d2992f66c414bd95339750.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
c50b533887d2992f66c414bd95339750.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
c53059381a17db7f48cf6871b7869c48.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
c53059381a17db7f48cf6871b7869c48.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8.exe
Resource
win10v2004-20250314-en
General
-
Target
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
-
Size
5.9MB
-
MD5
c3aaa8d0678c59cfe55a289d29c5b3d1
-
SHA1
2c592322b164e7fa9282bfdb7a650dbe4d41492c
-
SHA256
c18fdffa9d1b4bc8ae2f14f8685b9dcad5d250760d0fe059c522115dac9a3d24
-
SHA512
e36f85f15ee3e026fcac40603e8985277f1196d2435cb95c24ffa9afc1dbd09c69474be0d601c7b6a6c67bec203369cfb1e67aa6db1ae1a0056910b12bd70408
-
SSDEEP
98304:ByeUxPQ0JMLyWIvqrhH05I8TderKjHDFUh9HkEXJfw4G:ByeU11Rvqmu8TWKnF6N/1w3
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2764 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1116 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1152 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2396 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1424 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 852 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2740 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 948 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1020 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 700 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2568 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1252 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 544 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1224 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1008 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 708 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1652 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1056 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1168 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 772 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1768 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1180 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 2748 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1028 2748 schtasks.exe 29 -
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" c3aaa8d0678c59cfe55a289d29c5b3d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" c3aaa8d0678c59cfe55a289d29c5b3d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c3aaa8d0678c59cfe55a289d29c5b3d1.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1628 powershell.exe 1632 powershell.exe 2728 powershell.exe 1264 powershell.exe 1424 powershell.exe 2416 powershell.exe 3016 powershell.exe 2452 powershell.exe 1976 powershell.exe 2688 powershell.exe 2260 powershell.exe 2128 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts c3aaa8d0678c59cfe55a289d29c5b3d1.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 Idle.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c3aaa8d0678c59cfe55a289d29c5b3d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c3aaa8d0678c59cfe55a289d29c5b3d1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 3024 Idle.exe 3024 Idle.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File created C:\Program Files\Common Files\System\ja-JP\services.exe c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\RCX83CE.tmp c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Program Files\Windows Media Player\Visualizations\lsass.exe c3aaa8d0678c59cfe55a289d29c5b3d1.exe File created C:\Program Files (x86)\Windows Sidebar\lsass.exe c3aaa8d0678c59cfe55a289d29c5b3d1.exe File created C:\Program Files (x86)\Windows Sidebar\6203df4a6bafc7 c3aaa8d0678c59cfe55a289d29c5b3d1.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\lsass.exe c3aaa8d0678c59cfe55a289d29c5b3d1.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\6203df4a6bafc7 c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\RCX76C9.tmp c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\services.exe c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\RCX83EE.tmp c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\lsass.exe c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\lsass.exe c3aaa8d0678c59cfe55a289d29c5b3d1.exe File created C:\Program Files\Common Files\System\ja-JP\c5b4cb5e9653cc c3aaa8d0678c59cfe55a289d29c5b3d1.exe File created C:\Program Files\Windows Media Player\Visualizations\lsass.exe c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\RCX7467.tmp c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\RCX74A6.tmp c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\RCX7709.tmp c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Program Files\Windows Media Player\Visualizations\RCX8FCA.tmp c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Program Files\Windows Media Player\Visualizations\RCX9009.tmp c3aaa8d0678c59cfe55a289d29c5b3d1.exe File created C:\Program Files\Windows Media Player\Visualizations\6203df4a6bafc7 c3aaa8d0678c59cfe55a289d29c5b3d1.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\BitLockerDiscoveryVolumeContents\csrss.exe c3aaa8d0678c59cfe55a289d29c5b3d1.exe File created C:\Windows\BitLockerDiscoveryVolumeContents\886983d96e3d3e c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\RCX8602.tmp c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\RCX8641.tmp c3aaa8d0678c59cfe55a289d29c5b3d1.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\csrss.exe c3aaa8d0678c59cfe55a289d29c5b3d1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2248 schtasks.exe 1168 schtasks.exe 1020 schtasks.exe 2192 schtasks.exe 1996 schtasks.exe 1180 schtasks.exe 2568 schtasks.exe 1252 schtasks.exe 1652 schtasks.exe 1028 schtasks.exe 2736 schtasks.exe 2764 schtasks.exe 1116 schtasks.exe 2944 schtasks.exe 2272 schtasks.exe 1948 schtasks.exe 1768 schtasks.exe 2932 schtasks.exe 1152 schtasks.exe 1224 schtasks.exe 2872 schtasks.exe 708 schtasks.exe 2108 schtasks.exe 852 schtasks.exe 948 schtasks.exe 1008 schtasks.exe 1056 schtasks.exe 772 schtasks.exe 2744 schtasks.exe 1520 schtasks.exe 700 schtasks.exe 1424 schtasks.exe 3044 schtasks.exe 544 schtasks.exe 2396 schtasks.exe 2740 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 1628 powershell.exe 2416 powershell.exe 2688 powershell.exe 1264 powershell.exe 2452 powershell.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 1976 powershell.exe 3016 powershell.exe 1424 powershell.exe 2728 powershell.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe Token: SeDebugPrivilege 1628 powershell.exe Token: SeDebugPrivilege 2416 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 1264 powershell.exe Token: SeDebugPrivilege 2452 powershell.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 3016 powershell.exe Token: SeDebugPrivilege 1424 powershell.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 1632 powershell.exe Token: SeDebugPrivilege 2128 powershell.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 3024 Idle.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1628 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 66 PID 2412 wrote to memory of 1628 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 66 PID 2412 wrote to memory of 1628 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 66 PID 2412 wrote to memory of 1976 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 67 PID 2412 wrote to memory of 1976 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 67 PID 2412 wrote to memory of 1976 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 67 PID 2412 wrote to memory of 1632 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 68 PID 2412 wrote to memory of 1632 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 68 PID 2412 wrote to memory of 1632 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 68 PID 2412 wrote to memory of 2452 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 72 PID 2412 wrote to memory of 2452 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 72 PID 2412 wrote to memory of 2452 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 72 PID 2412 wrote to memory of 2688 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 73 PID 2412 wrote to memory of 2688 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 73 PID 2412 wrote to memory of 2688 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 73 PID 2412 wrote to memory of 2728 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 74 PID 2412 wrote to memory of 2728 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 74 PID 2412 wrote to memory of 2728 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 74 PID 2412 wrote to memory of 2260 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 75 PID 2412 wrote to memory of 2260 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 75 PID 2412 wrote to memory of 2260 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 75 PID 2412 wrote to memory of 1264 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 76 PID 2412 wrote to memory of 1264 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 76 PID 2412 wrote to memory of 1264 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 76 PID 2412 wrote to memory of 1424 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 77 PID 2412 wrote to memory of 1424 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 77 PID 2412 wrote to memory of 1424 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 77 PID 2412 wrote to memory of 2416 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 78 PID 2412 wrote to memory of 2416 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 78 PID 2412 wrote to memory of 2416 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 78 PID 2412 wrote to memory of 2128 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 79 PID 2412 wrote to memory of 2128 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 79 PID 2412 wrote to memory of 2128 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 79 PID 2412 wrote to memory of 3016 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 80 PID 2412 wrote to memory of 3016 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 80 PID 2412 wrote to memory of 3016 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 80 PID 2412 wrote to memory of 1536 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 87 PID 2412 wrote to memory of 1536 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 87 PID 2412 wrote to memory of 1536 2412 c3aaa8d0678c59cfe55a289d29c5b3d1.exe 87 PID 1536 wrote to memory of 2460 1536 cmd.exe 92 PID 1536 wrote to memory of 2460 1536 cmd.exe 92 PID 1536 wrote to memory of 2460 1536 cmd.exe 92 PID 1536 wrote to memory of 3024 1536 cmd.exe 93 PID 1536 wrote to memory of 3024 1536 cmd.exe 93 PID 1536 wrote to memory of 3024 1536 cmd.exe 93 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c3aaa8d0678c59cfe55a289d29c5b3d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" c3aaa8d0678c59cfe55a289d29c5b3d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" c3aaa8d0678c59cfe55a289d29c5b3d1.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3aaa8d0678c59cfe55a289d29c5b3d1.exe"C:\Users\Admin\AppData\Local\Temp\c3aaa8d0678c59cfe55a289d29c5b3d1.exe"1⤵
- UAC bypass
- Drops file in Drivers directory
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2412 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1od16j7CFS.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2460
-
-
C:\Users\All Users\Microsoft Help\Idle.exe"C:\Users\All Users\Microsoft Help\Idle.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Sidebar\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Sidebar\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Program Files\Common Files\System\ja-JP\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Common Files\System\ja-JP\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files\Common Files\System\ja-JP\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Microsoft Help\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft Help\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Microsoft Help\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Music\Sample Music\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Public\Music\Sample Music\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Music\Sample Music\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Media Player\Visualizations\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\Visualizations\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Media Player\Visualizations\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1180
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5c3aaa8d0678c59cfe55a289d29c5b3d1
SHA12c592322b164e7fa9282bfdb7a650dbe4d41492c
SHA256c18fdffa9d1b4bc8ae2f14f8685b9dcad5d250760d0fe059c522115dac9a3d24
SHA512e36f85f15ee3e026fcac40603e8985277f1196d2435cb95c24ffa9afc1dbd09c69474be0d601c7b6a6c67bec203369cfb1e67aa6db1ae1a0056910b12bd70408
-
Filesize
5.9MB
MD58a62c03be5f285216230e529589df9ab
SHA1fd20aa14f574e3006f3f11ac8b9a5e8b08626ab7
SHA256eaea2bb249c3cc04ce82047bba16a027da93b6c26df4b1d062a3bacabea57c28
SHA512a97d4b981c06a55266c82df174c9b7559961a4e2c0409742e7f5880090a8e533edc1af3264e69b2218df793d528ab7c5dd3b9bd56d722e422579ee0f68e919bc
-
Filesize
5.9MB
MD5cb8ff0055a99e7f68885d3dfece3a326
SHA1c820a5d667f51cfcf2a69bea4ffb655a0e768485
SHA25643b084581895600b321d0050d6ed839579d8d4228c6c2de7a254600153d43e77
SHA5129a5ec483714014a5f762efe38a3f8f984b6539f27c1f49a21ac67625025b8187c2a2f4d28548bfe53484497cd77e61318b9204e52fbff43b8543b112ae6a1df8
-
Filesize
207B
MD5c55c476ca72655639f69c541444ad650
SHA173da9a6aadf389c500fd90c9bcd09f825bf847c2
SHA2568864c70fccc0bff6b662ff07843a1af93ed209de6faa9137f2727df33b36e630
SHA512d358adc3f997711c3e30d79a442cf167a7288c28e5e8c39f60646f70c6d77b7c6a6f630234bf31c3427f049a9a688057c968b2fb00fa96fa46089817fe659b51
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50e6fea2c1bf8b8dda974b812b6fda724
SHA17f8a327b55a59f074180e34e7f3f4c806bcebf0a
SHA256cf128d7f3cb275ad2fbde8006e8fb5b30bd9b4f3b18409133ce84626ee448f6c
SHA51292997f0e4b1416c76a6b10a8f8963c05184e831303954a0f705e464f9f21b6cfaeb30404751d0ba3719cc9c77d80aeee21481eb4a74402f464694f25c1bb0f57