Analysis
-
max time kernel
134s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 15:16
Static task
static1
Behavioral task
behavioral1
Sample
хомяк.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
хомяк.exe
Resource
win10v2004-20240508-en
General
-
Target
хомяк.exe
-
Size
13.5MB
-
MD5
a26a308a71c3fd57cd4fad9dc8d55fb1
-
SHA1
3722d8d2b321f72b2e207a8e1f7e408d35c7d607
-
SHA256
12b1d0212363628cb57d2379017b94d6bf91029b37b2dcee592a564952855694
-
SHA512
306868bb537ffae0a7cd4de76b0f52079b2aa5f744f50abe3a866f4bb2f17a829cb91537a30c76240798248a0e9da6d5f92591ed1e7101337e2aa0f78e764e55
-
SSDEEP
393216:n5BbqQ/ThnhIxo1S/Js7D+xZlwRjMAke5F:5P4xy0ADFRYAj
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4632 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3248 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4904 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1128 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4004 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4168 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5032 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4916 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4140 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3100 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4068 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4520 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3692 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 748 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 556 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4396 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 208 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4568 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2224 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2680 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4012 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2096 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1412 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1020 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3148 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4424 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4376 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4540 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3912 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5024 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1528 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3064 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3436 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 404 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4728 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 464 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2732 2316 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4716 2316 schtasks.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\NVIDIA Container.exe dcrat C:\NVIDIA\DisplayDriver\535.21\NVIDIA Container.exe dcrat behavioral2/memory/4576-79-0x00000000006C0000-0x000000000082A000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeNVIDIA Container.exeNVIDIA Container.exeWScript.exeСтоны.exeNVIDIA Container.exeWScript.exeNVIDIA Container.exe╤à╨╛╨╝╤Å╨║.exeYkraine.exehitler.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation NVIDIA Container.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation NVIDIA Container.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Стоны.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation NVIDIA Container.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation NVIDIA Container.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ╤à╨╛╨╝╤Å╨║.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Ykraine.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation hitler.exe -
Executes dropped EXE 11 IoCs
Processes:
hitler.exetin.exeYkraine.exeСтоны.exeNVIDIA Container.exeNVIDIA Container.exeNVIDIA Container.exeNVIDIA Container.exeNVIDIA Container.exeNVIDIA Container.exeStartMenuExperienceHost.exepid process 1560 hitler.exe 1612 tin.exe 1552 Ykraine.exe 2676 Стоны.exe 544 NVIDIA Container.exe 5008 NVIDIA Container.exe 2232 NVIDIA Container.exe 4576 NVIDIA Container.exe 1540 NVIDIA Container.exe 3892 NVIDIA Container.exe 60 StartMenuExperienceHost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
tin.exedescription ioc process File opened for modification \??\PhysicalDrive0 tin.exe -
Drops file in Program Files directory 4 IoCs
Processes:
NVIDIA Container.exedescription ioc process File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\RuntimeBroker.exe NVIDIA Container.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\9e8d7a4ca61bd9 NVIDIA Container.exe File created C:\Program Files\Windows Mail\NVIDIA Container.exe NVIDIA Container.exe File created C:\Program Files\Windows Mail\35158c38368e73 NVIDIA Container.exe -
Drops file in Windows directory 6 IoCs
Processes:
NVIDIA Container.exedescription ioc process File created C:\Windows\GameBarPresenceWriter\38384e6a620884 NVIDIA Container.exe File created C:\Windows\SoftwareDistribution\DataStore\dllhost.exe NVIDIA Container.exe File created C:\Windows\SoftwareDistribution\DataStore\5940a34987c991 NVIDIA Container.exe File created C:\Windows\BitLockerDiscoveryVolumeContents\TextInputHost.exe NVIDIA Container.exe File created C:\Windows\BitLockerDiscoveryVolumeContents\22eafd247d37c3 NVIDIA Container.exe File created C:\Windows\GameBarPresenceWriter\SearchApp.exe NVIDIA Container.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
Processes:
NVIDIA Container.exeNVIDIA Container.exeNVIDIA Container.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings NVIDIA Container.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings NVIDIA Container.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings NVIDIA Container.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4632 schtasks.exe 3692 schtasks.exe 208 schtasks.exe 2680 schtasks.exe 404 schtasks.exe 2732 schtasks.exe 1492 schtasks.exe 748 schtasks.exe 1628 schtasks.exe 1528 schtasks.exe 1924 schtasks.exe 4728 schtasks.exe 4236 schtasks.exe 4520 schtasks.exe 4012 schtasks.exe 1412 schtasks.exe 1020 schtasks.exe 3064 schtasks.exe 5032 schtasks.exe 2224 schtasks.exe 3148 schtasks.exe 3436 schtasks.exe 464 schtasks.exe 2776 schtasks.exe 2816 schtasks.exe 2300 schtasks.exe 4004 schtasks.exe 4916 schtasks.exe 3100 schtasks.exe 5024 schtasks.exe 1128 schtasks.exe 4140 schtasks.exe 556 schtasks.exe 4396 schtasks.exe 4540 schtasks.exe 4904 schtasks.exe 4168 schtasks.exe 4068 schtasks.exe 4716 schtasks.exe 3912 schtasks.exe 1380 schtasks.exe 1284 schtasks.exe 3248 schtasks.exe 4568 schtasks.exe 2096 schtasks.exe 4424 schtasks.exe 4376 schtasks.exe 2068 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
NVIDIA Container.exepid process 4576 NVIDIA Container.exe 4576 NVIDIA Container.exe 4576 NVIDIA Container.exe 4576 NVIDIA Container.exe 4576 NVIDIA Container.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
NVIDIA Container.exeNVIDIA Container.exeNVIDIA Container.exeStartMenuExperienceHost.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 4576 NVIDIA Container.exe Token: SeDebugPrivilege 3892 NVIDIA Container.exe Token: SeDebugPrivilege 1540 NVIDIA Container.exe Token: SeDebugPrivilege 60 StartMenuExperienceHost.exe Token: 33 1600 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1600 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
╤à╨╛╨╝╤Å╨║.exeYkraine.exehitler.exeСтоны.exeNVIDIA Container.exeNVIDIA Container.exeNVIDIA Container.exeWScript.execmd.exeWScript.exeWScript.execmd.execmd.exeNVIDIA Container.exedescription pid process target process PID 4608 wrote to memory of 1560 4608 ╤à╨╛╨╝╤Å╨║.exe hitler.exe PID 4608 wrote to memory of 1560 4608 ╤à╨╛╨╝╤Å╨║.exe hitler.exe PID 4608 wrote to memory of 1612 4608 ╤à╨╛╨╝╤Å╨║.exe tin.exe PID 4608 wrote to memory of 1612 4608 ╤à╨╛╨╝╤Å╨║.exe tin.exe PID 4608 wrote to memory of 1612 4608 ╤à╨╛╨╝╤Å╨║.exe tin.exe PID 4608 wrote to memory of 1552 4608 ╤à╨╛╨╝╤Å╨║.exe Ykraine.exe PID 4608 wrote to memory of 1552 4608 ╤à╨╛╨╝╤Å╨║.exe Ykraine.exe PID 4608 wrote to memory of 2676 4608 ╤à╨╛╨╝╤Å╨║.exe Стоны.exe PID 4608 wrote to memory of 2676 4608 ╤à╨╛╨╝╤Å╨║.exe Стоны.exe PID 1552 wrote to memory of 544 1552 Ykraine.exe NVIDIA Container.exe PID 1552 wrote to memory of 544 1552 Ykraine.exe NVIDIA Container.exe PID 1552 wrote to memory of 544 1552 Ykraine.exe NVIDIA Container.exe PID 1560 wrote to memory of 5008 1560 hitler.exe NVIDIA Container.exe PID 1560 wrote to memory of 5008 1560 hitler.exe NVIDIA Container.exe PID 1560 wrote to memory of 5008 1560 hitler.exe NVIDIA Container.exe PID 2676 wrote to memory of 2232 2676 Стоны.exe NVIDIA Container.exe PID 2676 wrote to memory of 2232 2676 Стоны.exe NVIDIA Container.exe PID 2676 wrote to memory of 2232 2676 Стоны.exe NVIDIA Container.exe PID 544 wrote to memory of 1600 544 NVIDIA Container.exe WScript.exe PID 544 wrote to memory of 1600 544 NVIDIA Container.exe WScript.exe PID 544 wrote to memory of 1600 544 NVIDIA Container.exe WScript.exe PID 5008 wrote to memory of 3256 5008 NVIDIA Container.exe WScript.exe PID 5008 wrote to memory of 3256 5008 NVIDIA Container.exe WScript.exe PID 5008 wrote to memory of 3256 5008 NVIDIA Container.exe WScript.exe PID 2232 wrote to memory of 2276 2232 NVIDIA Container.exe WScript.exe PID 2232 wrote to memory of 2276 2232 NVIDIA Container.exe WScript.exe PID 2232 wrote to memory of 2276 2232 NVIDIA Container.exe WScript.exe PID 1600 wrote to memory of 2524 1600 WScript.exe cmd.exe PID 1600 wrote to memory of 2524 1600 WScript.exe cmd.exe PID 1600 wrote to memory of 2524 1600 WScript.exe cmd.exe PID 2524 wrote to memory of 4576 2524 cmd.exe NVIDIA Container.exe PID 2524 wrote to memory of 4576 2524 cmd.exe NVIDIA Container.exe PID 3256 wrote to memory of 3616 3256 WScript.exe cmd.exe PID 3256 wrote to memory of 3616 3256 WScript.exe cmd.exe PID 3256 wrote to memory of 3616 3256 WScript.exe cmd.exe PID 2276 wrote to memory of 2764 2276 WScript.exe cmd.exe PID 2276 wrote to memory of 2764 2276 WScript.exe cmd.exe PID 2276 wrote to memory of 2764 2276 WScript.exe cmd.exe PID 3616 wrote to memory of 1540 3616 cmd.exe NVIDIA Container.exe PID 3616 wrote to memory of 1540 3616 cmd.exe NVIDIA Container.exe PID 2764 wrote to memory of 3892 2764 cmd.exe NVIDIA Container.exe PID 2764 wrote to memory of 3892 2764 cmd.exe NVIDIA Container.exe PID 4576 wrote to memory of 60 4576 NVIDIA Container.exe StartMenuExperienceHost.exe PID 4576 wrote to memory of 60 4576 NVIDIA Container.exe StartMenuExperienceHost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\╤à╨╛╨╝╤Å╨║.exe"C:\Users\Admin\AppData\Local\Temp\╤à╨╛╨╝╤Å╨║.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\hitler.exe"C:\Users\Admin\AppData\Local\Temp\hitler.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NVIDIA Container.exe"C:\Users\Admin\AppData\Local\Temp\NVIDIA Container.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\NVIDIA\DisplayDriver\535.21\zajaYJ4rqwpmDK2a6yrvwdV.vbe"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\NVIDIA\DisplayDriver\535.21\mxJne99RtKqQDunPUGdos.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\NVIDIA\DisplayDriver\535.21\NVIDIA Container.exe"C:\NVIDIA\DisplayDriver\535.21\NVIDIA Container.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\tin.exe"C:\Users\Admin\AppData\Local\Temp\tin.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Local\Temp\Ykraine.exe"C:\Users\Admin\AppData\Local\Temp\Ykraine.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NVIDIA Container.exe"C:\Users\Admin\AppData\Local\Temp\NVIDIA Container.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\NVIDIA\DisplayDriver\535.21\zajaYJ4rqwpmDK2a6yrvwdV.vbe"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\NVIDIA\DisplayDriver\535.21\mxJne99RtKqQDunPUGdos.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\NVIDIA\DisplayDriver\535.21\NVIDIA Container.exe"C:\NVIDIA\DisplayDriver\535.21\NVIDIA Container.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Default\Downloads\StartMenuExperienceHost.exe"C:\Users\Default\Downloads\StartMenuExperienceHost.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Стоны.exe"C:\Users\Admin\AppData\Local\Temp\Стоны.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NVIDIA Container.exe"C:\Users\Admin\AppData\Local\Temp\NVIDIA Container.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\NVIDIA\DisplayDriver\535.21\zajaYJ4rqwpmDK2a6yrvwdV.vbe"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\NVIDIA\DisplayDriver\535.21\mxJne99RtKqQDunPUGdos.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\NVIDIA\DisplayDriver\535.21\NVIDIA Container.exe"C:\NVIDIA\DisplayDriver\535.21\NVIDIA Container.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Default User\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "NVIDIA ContainerN" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Mail\NVIDIA Container.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "NVIDIA Container" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\NVIDIA Container.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "NVIDIA ContainerN" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Mail\NVIDIA Container.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Users\Default\My Documents\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Users\Default\My Documents\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 10 /tr "'C:\Users\Default\My Documents\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Downloads\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\Default\Downloads\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Downloads\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\NVIDIA\DisplayDriver\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\NVIDIA\DisplayDriver\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\NVIDIA\DisplayDriver\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Downloads\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\Admin\Downloads\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Downloads\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\NVIDIA\DisplayDriver\535.21\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\NVIDIA\DisplayDriver\535.21\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\NVIDIA\DisplayDriver\535.21\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 10 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Saved Games\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\Saved Games\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Saved Games\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Windows\GameBarPresenceWriter\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\GameBarPresenceWriter\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 10 /tr "'C:\Windows\GameBarPresenceWriter\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\NVIDIA\DisplayDriver\535.21\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\NVIDIA\DisplayDriver\535.21\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\NVIDIA\DisplayDriver\535.21\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\NVIDIA\DisplayDriver\535.21\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\NVIDIA\DisplayDriver\535.21\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\NVIDIA\DisplayDriver\535.21\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\NVIDIA\DisplayDriver\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\NVIDIA\DisplayDriver\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\NVIDIA\DisplayDriver\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\SoftwareDistribution\DataStore\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\DataStore\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Windows\SoftwareDistribution\DataStore\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4e0 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\NVIDIA\DisplayDriver\535.21\NVIDIA Container.exeFilesize
1.4MB
MD54a591f46c87b49a7de93f5ac771cd4ab
SHA1e0992350818e5c56d3f2e3a6db340d1f5b8f3314
SHA256b495e22042b08f27b690da18986ec74d5054a65d05d5cf41fdecd5751482ccbd
SHA512b498445d1e427853690250aebff35cbd7e28e85a89ad868e3483930b16ec13198357cfcd5feb45567b1bc8f3d9f97c5ecf2d242c8a5e9d758a536d0498ba7955
-
C:\NVIDIA\DisplayDriver\535.21\mxJne99RtKqQDunPUGdos.batFilesize
53B
MD57784d810f5ff3afa8df50e360eb90e7d
SHA1f04802a991ff6461aa1c35b7c0f68e43d5a114c6
SHA2560385dbf94fc27705560cf0b6b04e9a37181db486ee8f7573c5ad2217d18f4ca0
SHA51280038ae2bfd5f8ca3f4812ab5c342878f98978007125c9dca5edb915701a5383916131cdc3082c054c49c508cd210aff70319ac0fc498cbdd6cee776df672cac
-
C:\NVIDIA\DisplayDriver\535.21\zajaYJ4rqwpmDK2a6yrvwdV.vbeFilesize
225B
MD5d7df2670ad0c6c7b9cc48122f20f086c
SHA1e69bf8c214d8c4b768125ca03e402e1c871cc233
SHA256d3bf5c54de984dd2d1d779494deb8a995cc062eb5f25c465d0de78d99b8cc52b
SHA51205ed88410790bf74dc7ab880f893e555c4859c133e79a89f28b5e1a68c36f4a4f28d3b7b6532953c04b6d23a21faf53e60107efde9e6acb492a9235d48943f03
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\NVIDIA Container.exe.logFilesize
1KB
MD57800fca2323a4130444c572374a030f4
SHA140c9b8e0e5e7d72a5293f4010f2ccf21e637b4aa
SHA25629f5645ac14353ac460858f52c856548f3aeb144b09eef672a6b4849bafe742e
SHA512c8a7ad930b8c07007c7a67d8c32a2a4a401dcc34ab966e0e80901655fcbe1f5c95b72a195e6381b1de56c2c987eeab093d8e89891bec9e9684785c5d824b3554
-
C:\Users\Admin\AppData\Local\Temp\NVIDIA Container.exeFilesize
1.8MB
MD5531bf67134a7c1fb4096113ca58cc648
SHA199e0fc1fb7a07c0685e426b327921d3e6c34498c
SHA25667942630366d114efa35f3f4a79741a4a4eb2c3b0c8ffaac07af527f84d4489a
SHA5128facae8335a4f33f54e48c64814946eb8b480800b4453612fffcef64117946a35d493f433d4e27186ee864603da756319f816e70c3bfc08b8bb1861fc7030ff4
-
C:\Users\Admin\AppData\Local\Temp\Ykraine.exeFilesize
1.4MB
MD5da5341ed73474db53c94c38f66e210ae
SHA149d8d239ac77cde765c8f516be1e52c3d2d37a2e
SHA256bae4b959e9f74d9d085067b57a805654c86cc45f8c7cd32b9711874504ae59dd
SHA512c2c5cf298aa6476b043e9afcd2ca4a2e685b8a96187d69b834f9f3761aa1d525a4b032d19ea03d349ef32a3ba699c3126bc359cb7f117395f5303ebebf310572
-
C:\Users\Admin\AppData\Local\Temp\hitler.exeFilesize
10.4MB
MD53a1733f19b9ca74fe793df23700c3519
SHA131cf4474f0ac00d45c19b7e31e7dc9fde3054091
SHA2561b2a026beda12eff88e2397931018031e4358de05aa449e3441434e6cf5dad6c
SHA5120cd23dce1880c0b11d19f7d58102020baba7033e828aee233f8ed6b7d11c622d1dcec38c4a3e6c4691e07f7a1609fe550a30517e662236e164e550e87bea777b
-
C:\Users\Admin\AppData\Local\Temp\tin.exeFilesize
439KB
MD5b3edc0708fb191e2d3016c68585ed31e
SHA1ab1ce0cb2a819b82206dc1e922e97b284b585d17
SHA256c9fffa589040d8a6d22285255604948ff3bb3efa7077c776b6b09272bc293b7d
SHA51277b67f4cf6344f56e20172357831497c6ae4ff57c5a852762437419a7e5819805e10098dc87f90e937cf7603b72a94e6cf66681e1602974355fae8644b2a42dc
-
C:\Users\Admin\AppData\Local\Temp\Стоны.exeFilesize
1.5MB
MD590132dd5e5a65801d56cb0b20c92d724
SHA1bec1e6ef261f88b0aca2cb0aca2ea1eaf5f9aae7
SHA2568e9e6d72b2a39b62c7341bdc0f529a070f25b2c33bfefe5b6cc6e5d3c86590e9
SHA512e8c0bb9a9390558a117bdf5518a136a41b84417b01b835d092202b3e2d644bf997bd344e2a3f2a971aae5b5bcdeb85865250be5fcf86e840d854cbc7791e5f33
-
memory/1552-39-0x0000000000DE0000-0x0000000000F58000-memory.dmpFilesize
1.5MB
-
memory/1560-24-0x00007FF917AA0000-0x00007FF918561000-memory.dmpFilesize
10.8MB
-
memory/1560-25-0x0000000000590000-0x0000000000FF0000-memory.dmpFilesize
10.4MB
-
memory/1560-71-0x00007FF917AA0000-0x00007FF918561000-memory.dmpFilesize
10.8MB
-
memory/1612-26-0x0000000000480000-0x000000000051D000-memory.dmpFilesize
628KB
-
memory/2676-48-0x0000000000690000-0x0000000000818000-memory.dmpFilesize
1.5MB
-
memory/4576-79-0x00000000006C0000-0x000000000082A000-memory.dmpFilesize
1.4MB
-
memory/4576-80-0x000000001B940000-0x000000001B95C000-memory.dmpFilesize
112KB
-
memory/4576-81-0x000000001B9B0000-0x000000001BA00000-memory.dmpFilesize
320KB
-
memory/4576-83-0x000000001B980000-0x000000001B990000-memory.dmpFilesize
64KB
-
memory/4576-82-0x000000001B960000-0x000000001B976000-memory.dmpFilesize
88KB
-
memory/4576-84-0x000000001B990000-0x000000001B99E000-memory.dmpFilesize
56KB
-
memory/4576-85-0x000000001B9A0000-0x000000001B9AE000-memory.dmpFilesize
56KB
-
memory/4576-86-0x000000001BA00000-0x000000001BA0C000-memory.dmpFilesize
48KB
-
memory/4608-52-0x00007FF917AA0000-0x00007FF918561000-memory.dmpFilesize
10.8MB
-
memory/4608-5-0x00007FF917AA0000-0x00007FF918561000-memory.dmpFilesize
10.8MB
-
memory/4608-0-0x00007FF917AA3000-0x00007FF917AA5000-memory.dmpFilesize
8KB
-
memory/4608-1-0x0000000000D80000-0x0000000001B0A000-memory.dmpFilesize
13.5MB