Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-11-2020 11:44
Static task
static1
Behavioral task
behavioral1
Sample
88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe
Resource
win10v20201028
General
-
Target
88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe
-
Size
235KB
-
MD5
4337376d9ec4d6ed203a2b5cf5176e47
-
SHA1
e2d7ee39bfd8de8b6793b916543d9b7d4d0af43d
-
SHA256
88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6
-
SHA512
5bc818a8f46d46b30ac90833257ad65307a3adf2db8d6469bfb5e69d95498d3aaec1dca6b8bdaa9003bb49829d555d9a51eb308952849e2c9c35fe7d8a33e626
Malware Config
Signatures
-
ServiceHost packer 7 IoCs
Detects ServiceHost packer used for .NET malware
Processes:
resource yara_rule behavioral2/memory/2876-8-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/2876-10-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/2876-9-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/2876-11-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/2876-14-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/2876-13-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/2876-15-0x0000000000000000-mapping.dmp servicehost -
Executes dropped EXE 1 IoCs
Processes:
oqan.exepid process 2876 oqan.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
oqan.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\Currentversion\Run oqan.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Alzeed = "C:\\Users\\Admin\\AppData\\Roaming\\Iviges\\oqan.exe" oqan.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exedescription pid process target process PID 64 set thread context of 504 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe cmd.exe -
Program crash 36 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3468 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 636 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 2204 2876 WerFault.exe oqan.exe 2772 2876 WerFault.exe oqan.exe 992 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 1328 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 2092 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 520 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 3872 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 4008 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 2236 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 2192 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 2832 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 2904 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 3824 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 3712 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 2600 2876 WerFault.exe oqan.exe 3988 2876 WerFault.exe oqan.exe 3352 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 8 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 1676 2876 WerFault.exe oqan.exe 2788 2876 WerFault.exe oqan.exe 1288 64 WerFault.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe 3388 2876 WerFault.exe oqan.exe 1564 2876 WerFault.exe oqan.exe 416 2876 WerFault.exe oqan.exe 4056 2876 WerFault.exe oqan.exe 2216 2876 WerFault.exe oqan.exe 3184 2876 WerFault.exe oqan.exe 848 2876 WerFault.exe oqan.exe 3524 2876 WerFault.exe oqan.exe 184 2876 WerFault.exe oqan.exe 1252 2876 WerFault.exe oqan.exe 1920 2876 WerFault.exe oqan.exe 1156 2876 WerFault.exe oqan.exe 584 2876 WerFault.exe oqan.exe -
Processes:
88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Privacy 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe -
Suspicious behavior: EnumeratesProcesses 102 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeoqan.exepid process 3468 WerFault.exe 3468 WerFault.exe 3468 WerFault.exe 3468 WerFault.exe 3468 WerFault.exe 3468 WerFault.exe 3468 WerFault.exe 3468 WerFault.exe 3468 WerFault.exe 3468 WerFault.exe 3468 WerFault.exe 3468 WerFault.exe 3468 WerFault.exe 3468 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2876 oqan.exe 2876 oqan.exe 2876 oqan.exe 2876 oqan.exe 2876 oqan.exe 2876 oqan.exe 2876 oqan.exe 2876 oqan.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
WerFault.exeWerFault.exe88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 3468 WerFault.exe Token: SeBackupPrivilege 3468 WerFault.exe Token: SeDebugPrivilege 3468 WerFault.exe Token: SeDebugPrivilege 636 WerFault.exe Token: SeSecurityPrivilege 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe Token: SeSecurityPrivilege 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe Token: SeDebugPrivilege 2204 WerFault.exe Token: SeDebugPrivilege 2772 WerFault.exe Token: SeSecurityPrivilege 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe Token: SeSecurityPrivilege 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe Token: SeSecurityPrivilege 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe Token: SeSecurityPrivilege 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe Token: SeSecurityPrivilege 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe Token: SeSecurityPrivilege 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe Token: SeSecurityPrivilege 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe Token: SeSecurityPrivilege 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe -
Suspicious use of WriteProcessMemory 71 IoCs
Processes:
88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exeoqan.exedescription pid process target process PID 64 wrote to memory of 2876 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe oqan.exe PID 64 wrote to memory of 2876 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe oqan.exe PID 64 wrote to memory of 2876 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe oqan.exe PID 2876 wrote to memory of 2340 2876 oqan.exe sihost.exe PID 2876 wrote to memory of 2340 2876 oqan.exe sihost.exe PID 2876 wrote to memory of 2340 2876 oqan.exe sihost.exe PID 2876 wrote to memory of 2340 2876 oqan.exe sihost.exe PID 2876 wrote to memory of 2340 2876 oqan.exe sihost.exe PID 2876 wrote to memory of 2352 2876 oqan.exe svchost.exe PID 2876 wrote to memory of 2352 2876 oqan.exe svchost.exe PID 2876 wrote to memory of 2352 2876 oqan.exe svchost.exe PID 2876 wrote to memory of 2352 2876 oqan.exe svchost.exe PID 2876 wrote to memory of 2352 2876 oqan.exe svchost.exe PID 2876 wrote to memory of 2440 2876 oqan.exe taskhostw.exe PID 2876 wrote to memory of 2440 2876 oqan.exe taskhostw.exe PID 2876 wrote to memory of 2440 2876 oqan.exe taskhostw.exe PID 2876 wrote to memory of 2440 2876 oqan.exe taskhostw.exe PID 2876 wrote to memory of 2440 2876 oqan.exe taskhostw.exe PID 2876 wrote to memory of 2864 2876 oqan.exe Explorer.EXE PID 2876 wrote to memory of 2864 2876 oqan.exe Explorer.EXE PID 2876 wrote to memory of 2864 2876 oqan.exe Explorer.EXE PID 2876 wrote to memory of 2864 2876 oqan.exe Explorer.EXE PID 2876 wrote to memory of 2864 2876 oqan.exe Explorer.EXE PID 2876 wrote to memory of 3260 2876 oqan.exe ShellExperienceHost.exe PID 2876 wrote to memory of 3260 2876 oqan.exe ShellExperienceHost.exe PID 2876 wrote to memory of 3260 2876 oqan.exe ShellExperienceHost.exe PID 2876 wrote to memory of 3260 2876 oqan.exe ShellExperienceHost.exe PID 2876 wrote to memory of 3260 2876 oqan.exe ShellExperienceHost.exe PID 2876 wrote to memory of 3272 2876 oqan.exe SearchUI.exe PID 2876 wrote to memory of 3272 2876 oqan.exe SearchUI.exe PID 2876 wrote to memory of 3272 2876 oqan.exe SearchUI.exe PID 2876 wrote to memory of 3272 2876 oqan.exe SearchUI.exe PID 2876 wrote to memory of 3272 2876 oqan.exe SearchUI.exe PID 2876 wrote to memory of 3532 2876 oqan.exe RuntimeBroker.exe PID 2876 wrote to memory of 3532 2876 oqan.exe RuntimeBroker.exe PID 2876 wrote to memory of 3532 2876 oqan.exe RuntimeBroker.exe PID 2876 wrote to memory of 3532 2876 oqan.exe RuntimeBroker.exe PID 2876 wrote to memory of 3532 2876 oqan.exe RuntimeBroker.exe PID 2876 wrote to memory of 3780 2876 oqan.exe DllHost.exe PID 2876 wrote to memory of 3780 2876 oqan.exe DllHost.exe PID 2876 wrote to memory of 3780 2876 oqan.exe DllHost.exe PID 2876 wrote to memory of 3780 2876 oqan.exe DllHost.exe PID 2876 wrote to memory of 3780 2876 oqan.exe DllHost.exe PID 2876 wrote to memory of 64 2876 oqan.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe PID 2876 wrote to memory of 64 2876 oqan.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe PID 2876 wrote to memory of 64 2876 oqan.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe PID 2876 wrote to memory of 64 2876 oqan.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe PID 2876 wrote to memory of 64 2876 oqan.exe 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe PID 2876 wrote to memory of 2448 2876 oqan.exe slui.exe PID 2876 wrote to memory of 2448 2876 oqan.exe slui.exe PID 2876 wrote to memory of 2448 2876 oqan.exe slui.exe PID 2876 wrote to memory of 2448 2876 oqan.exe slui.exe PID 2876 wrote to memory of 2448 2876 oqan.exe slui.exe PID 2876 wrote to memory of 1336 2876 oqan.exe PID 2876 wrote to memory of 1336 2876 oqan.exe PID 2876 wrote to memory of 1336 2876 oqan.exe PID 2876 wrote to memory of 1336 2876 oqan.exe PID 2876 wrote to memory of 1336 2876 oqan.exe PID 64 wrote to memory of 504 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe cmd.exe PID 64 wrote to memory of 504 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe cmd.exe PID 64 wrote to memory of 504 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe cmd.exe PID 64 wrote to memory of 504 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe cmd.exe PID 64 wrote to memory of 504 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe cmd.exe PID 64 wrote to memory of 504 64 88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe cmd.exe
Processes
-
c:\windows\system32\sihost.exesihost.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe"C:\Users\Admin\AppData\Local\Temp\88f9a5e66ae617012a32381f78f76af3beb3f409e3e8e5520db6bc6b1584b9a6.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 6683⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 7043⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Iviges\oqan.exe"C:\Users\Admin\AppData\Roaming\Iviges\oqan.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 6524⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 3804⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 7444⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 7804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 8604⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 8924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 7444⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 7964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 8084⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 7484⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 7284⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 9684⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 9724⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 8924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 10724⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 13564⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 14524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 14524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 14844⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 6723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 8323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 8763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 8363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 9163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 9963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 6523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 9403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 10723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 11603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 12043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 12403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 13523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 13883⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp44b17896.bat"3⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 2683⤵
- Program crash
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\slui.exeC:\Windows\System32\slui.exe -Embedding1⤵
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Buan\ceow.urtMD5
9bab57f739616dbb2ddd6749c989984d
SHA15757af60e397fe337d640687209b2d1c2cb6ff73
SHA256d373bf02e0d83bfabea32712ebfa45382b17dd956d8a3c1a01ea55b89e2c0a69
SHA5124f9e6c2dbef980965312cad968bfea2c06ed2cb58fbc5fb307c44486197dce52c1f9237cfdfbc99f4097439fa2d72fc705b420503ce2a6757fd461df30217670
-
C:\Users\Admin\AppData\Roaming\Iviges\oqan.exeMD5
8e4f190760742008e548ee098d5481da
SHA149f8ed2829c20d75fe0bb0619c938c5f9dfe4e5f
SHA25681a8595c2131697d80921aaece0f20c93a0ed892d4e266ab4e473539f0680e4f
SHA512d16d30e62a55bc416156eb00b1cd9db7193f55fcb1924b43887ad4941b35263e67683151b28df1c9e138a2c8a3f6085d49431c48afd1b0f5085f324b24be6dec
-
C:\Users\Admin\AppData\Roaming\Iviges\oqan.exeMD5
8e4f190760742008e548ee098d5481da
SHA149f8ed2829c20d75fe0bb0619c938c5f9dfe4e5f
SHA25681a8595c2131697d80921aaece0f20c93a0ed892d4e266ab4e473539f0680e4f
SHA512d16d30e62a55bc416156eb00b1cd9db7193f55fcb1924b43887ad4941b35263e67683151b28df1c9e138a2c8a3f6085d49431c48afd1b0f5085f324b24be6dec
-
memory/64-24-0x0000000000130000-0x000000000016B000-memory.dmpFilesize
236KB
-
memory/504-26-0x000000000076EA5B-mapping.dmp
-
memory/504-25-0x0000000000760000-0x000000000079B000-memory.dmpFilesize
236KB
-
memory/636-2-0x0000000004DB0000-0x0000000004DB1000-memory.dmpFilesize
4KB
-
memory/636-3-0x00000000053E0000-0x00000000053E1000-memory.dmpFilesize
4KB
-
memory/2204-12-0x0000000004AB0000-0x0000000004AB1000-memory.dmpFilesize
4KB
-
memory/2204-7-0x0000000004480000-0x0000000004481000-memory.dmpFilesize
4KB
-
memory/2772-20-0x0000000004D40000-0x0000000004D41000-memory.dmpFilesize
4KB
-
memory/2772-16-0x0000000004610000-0x0000000004611000-memory.dmpFilesize
4KB
-
memory/2876-13-0x0000000000000000-mapping.dmp
-
memory/2876-19-0x0000000000000000-mapping.dmp
-
memory/2876-4-0x0000000000000000-mapping.dmp
-
memory/2876-15-0x0000000000000000-mapping.dmp
-
memory/2876-11-0x0000000000000000-mapping.dmp
-
memory/2876-17-0x0000000000000000-mapping.dmp
-
memory/2876-18-0x0000000000000000-mapping.dmp
-
memory/2876-14-0x0000000000000000-mapping.dmp
-
memory/2876-9-0x0000000000000000-mapping.dmp
-
memory/2876-21-0x0000000000000000-mapping.dmp
-
memory/2876-22-0x0000000000000000-mapping.dmp
-
memory/2876-23-0x0000000000000000-mapping.dmp
-
memory/2876-10-0x0000000000000000-mapping.dmp
-
memory/2876-8-0x0000000000000000-mapping.dmp
-
memory/3468-0-0x0000000004C50000-0x0000000004C51000-memory.dmpFilesize
4KB
-
memory/3468-1-0x0000000005380000-0x0000000005381000-memory.dmpFilesize
4KB