Analysis
-
max time kernel
1800s -
max time network
1802s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-09-2021 20:53
Static task
static1
Behavioral task
behavioral1
Sample
test.test.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
test.test.dll
Resource
win11
Behavioral task
behavioral3
Sample
test.test.dll
Resource
win10v20210408
General
-
Target
test.test.dll
-
Size
355KB
-
MD5
ed3b43ef66f58f891cc51cacc79b0b72
-
SHA1
02cfa19d275c96fafad6b3e440b220200b839f99
-
SHA256
9c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7
-
SHA512
73913ebf9895625de2b4a4e5c4534164f79b708bfc1338aade1d90aae57836bd7ea79e2a32976b138d8d5ab1d877ec5997428461acb588e732ec49ab8235d116
Malware Config
Extracted
qakbot
402.343
tr
1632730751
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 3888 regsvr32.exe 1344 regsvr32.exe -
Drops file in System32 directory 6 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 explorer.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\t4[1] explorer.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 648 1344 WerFault.exe regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abed58474128f6e92caefa75e6db5b6b14e8e1163d86869a30b8bfa618874567082c5ab16d19dfa16582f57944f70195a63caf3550aa9c380810574688d2a44d06a4af0ae7011fee2b75f6a29084d2b5a61aaa6e5515aa8473ca2bd08885102a5227607b6b4dbbc0bbba96d350b97c2d0b171924f02990fba9ecc12ac35bc975 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abed58474128f6e92caefa75e6db5b6b10e0ec163d86869a30b8bfa6188745670a2f59b16d19dfa16582f57944f70195a63caf3550aa9c380810574688d2a44d06a4af0ae7011fee2b75f6a29084d2b5a61aaa6e5515aa8473ca2bd08885102a5227607b6b4dbbc0bbba96d350b97c2d0b171924f02990fba9ecc12ac35bc975 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abed58474128f6e92caefa75e6db5b6b13e1e5163d86869a30b8bfa6188745670e215ab16d19dfa16582f57944f70195a63caf3550aa9c380810574688d2a44d06a4af0ae7011fee2b75f6a29084d2b5a61aaa6e5515aa8473ca2bd08885102a5227607b6b4dbbc0bbba96d350b97c2d0b171924f02990fba9ecc12ac35bc975 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abed58474128f6e92caefa75e6db5b6a13eae6163d86869a30b8bfa6188745660e2a59b16d19dfa16582f57944f70195a63caf3550aa9c380810574688d2a44d06a4af0ae7011fee2b75f6a29084d2b5a61aaa6e5515aa8473ca2bd08885102a5227607b6b4dbbc0bbba96d350b97c2d0b171924f02990fba9ecc12ac35bc975 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\cac39d1d = 16fb22d98c85ca7f763b14e31fedf390e6883e42957b363a82ae429dedc31e8f76bcb7c405fb1f6970d2c39dd803782546a9535fef503ee45b9b400e99ba366017d8a252ffd87f69891d6336bb00deaf63d2aadfed3eba61811953b5ff791b1695b2c551a81bd8bf3efab8cbace3b9309aaa13fe4064d11b9a9d7694aa78d9f832a5d5d62994 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abed58474128f6e92caefa75e6db5b6a10ede2163d86869a30b8bfa6188745660c2b5ab16d19dfa16582f57944f70195a63caf3550aa9c380810574688d2a44d06a4af0ae7011fee2b75f6a29084d2b5a61aaa6e5515aa8473ca2bd08885102a5227607b6b4dbbc0bbba96d350b97c2d0b171924f02990fba9ecc12ac35bc975 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abe458474128f6e92cafb075efd15d6012efe758368b8d9c3bba89325f74e87f1d57b179c4bbcc7b41c3f3642c552606d6ab18afc6fcb13971739a46e6014f403c4754ad59763f95c9eaec781eb1cae8097b66e510004c15e927b75d75018dbb0e47ad5c2ed17e4ba542435d37d522594f072af011873e explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\b58af2eb = 8724971e4ebedccf4ad0461fe48a72103a2291174e0cb2377c2007f0082ad5918d3d2b187854c2df0d00a52616c10939e3e3c0870bdc9011c3606d800c4ac85dbfbd5926 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\d36958e = e6bfee2893f55758f1ec056fa46a506d2faee048e155bbbb explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\c882bd61 = d968b2d9c0b8fb750920dd864ed134e079307e6abbcc1150d4a6487d8e1db3e0ab424854f7856b21cd6bb00caef2bd explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abed58474128f6e92caefa75e6db5b6b14e8e1163d86869a30b8bfa618874567062d5bb16d19dfa16582f57944f70195a63caf3550aa9c380810574688d2a44d06a4af0ae7011fee2b75f6a29084d2b5a61aaa6e5515aa8473ca2bd08885102a5227607b6b4dbbc0bbba96d350b97c2d0b171924f02990fba9ecc12ac35bc975 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\727ffa78 = fa1a56155d24ccc3b5dac8da646adf explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abed58474128f6e92caefa75e6db5b6b13e1e5163d86869a30b8bfa6188745670c2e5bb16d19dfa16582f57944f70195a63caf3550aa9c380810574688d2a44d06a4af0ae7011fee2b75f6a29084d2b5a61aaa6e5515aa8473ca2bd08885102a5227607b6b4dbbc0bbba96d350b97c2d0b171924f02990fba9ecc12ac35bc975 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abed58474128f6e92caefa75e6db5b6b10e0ec163d86869a30b8bfa6188745670c2e5bb16d19dfa16582f57944f70195a63caf3550aa9c380810574688d2a44d06a4af0ae7011fee2b75f6a29084d2b5a61aaa6e5515aa8473ca2bd08885102a5227607b6b4dbbc0bbba96d350b97c2d0b171924f02990fba9ecc12ac35bc975 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abed58474128f6e92caefa75e6db5b6b10e0ec163d86869a30b8bfa618874567082c5ab16d19dfa16582f57944f70195a63caf3550aa9c380810574688d2a44d06a4af0ae7011fee2b75f6a29084d2b5a61aaa6e5515aa8473ca2bd08885102a5227607b6b4dbbc0bbba96d350b97c2d0b171924f02990fba9ecc12ac35bc975 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\703eda04 = fd138a3e0d041af428e05e39384281b2b01e0e2adb8dbbd212bb393fe1e8c48666374c66e2fcf735fb6d78704c1253095a50aff3387c52a165a1 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abed58474128f6e92caefa75e6db5b6a10ede2163d86869a30b8bfa6188745660a285bb16d19dfa16582f57944f70195a63caf3550aa9c380810574688d2a44d06a4af0ae7011fee2b75f6a29084d2b5a61aaa6e5515aa8473ca2bd08885102a5227607b6b4dbbc0bbba96d350b97c2d0b171924f02990fba9ecc12ac35bc975 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abf35847411d6aaddc05e4659a39a455f40194666cf5730ba779c2a5b16aa006c8989a83993ac187cfbc37685d5127262d92ab13c3c142b71df3335a551b12fb9d2ebe39162e884e14490e146406ad47e1028292c1ba9384b07c2670ef677e146dd0 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abed58474128f6e92caefa75e6db5b6a13eae6163d86869a30b8bfa6188745660c2b5ab16d19dfa16582f57944f70195a63caf3550aa9c380810574688d2a44d06a4af0ae7011fee2b75f6a29084d2b5a61aaa6e5515aa8473ca2bd08885102a5227607b6b4dbbc0bbba96d350b97c2d0b171924f02990fba9ecc12ac35bc975 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\ff5c4d53 = 70abe458474128f6e92cafb075efd15d6012efe758368b8d9332bb89325f74e87f1d57b179c4bbcc7b41c3f3642c552606d6ab18afc6fcb13971739a46e6014f403c4754ad59763f95c9eaec781eb1cae8097b66e510004c15e927b75d75018dbb0e47ad5c2ed17e4ba542435d37d522594f072af011873e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Eomahbckyzplv\801522a5 = ddb0600bb8083aa3f93101220f4c9db728cc59e2651e2f explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1108 rundll32.exe 1108 rundll32.exe 3888 regsvr32.exe 3888 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1108 rundll32.exe 3888 regsvr32.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exeregsvr32.exedescription pid process target process PID 856 wrote to memory of 1108 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1108 856 rundll32.exe rundll32.exe PID 856 wrote to memory of 1108 856 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1252 1108 rundll32.exe explorer.exe PID 1108 wrote to memory of 1252 1108 rundll32.exe explorer.exe PID 1108 wrote to memory of 1252 1108 rundll32.exe explorer.exe PID 1108 wrote to memory of 1252 1108 rundll32.exe explorer.exe PID 1108 wrote to memory of 1252 1108 rundll32.exe explorer.exe PID 1252 wrote to memory of 1368 1252 explorer.exe schtasks.exe PID 1252 wrote to memory of 1368 1252 explorer.exe schtasks.exe PID 1252 wrote to memory of 1368 1252 explorer.exe schtasks.exe PID 808 wrote to memory of 3888 808 regsvr32.exe regsvr32.exe PID 808 wrote to memory of 3888 808 regsvr32.exe regsvr32.exe PID 808 wrote to memory of 3888 808 regsvr32.exe regsvr32.exe PID 3888 wrote to memory of 1200 3888 regsvr32.exe explorer.exe PID 3888 wrote to memory of 1200 3888 regsvr32.exe explorer.exe PID 3888 wrote to memory of 1200 3888 regsvr32.exe explorer.exe PID 3888 wrote to memory of 1200 3888 regsvr32.exe explorer.exe PID 3888 wrote to memory of 1200 3888 regsvr32.exe explorer.exe PID 1200 wrote to memory of 1032 1200 explorer.exe reg.exe PID 1200 wrote to memory of 1032 1200 explorer.exe reg.exe PID 1200 wrote to memory of 1568 1200 explorer.exe reg.exe PID 1200 wrote to memory of 1568 1200 explorer.exe reg.exe PID 3600 wrote to memory of 1344 3600 regsvr32.exe regsvr32.exe PID 3600 wrote to memory of 1344 3600 regsvr32.exe regsvr32.exe PID 3600 wrote to memory of 1344 3600 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\test.test.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\test.test.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn lymnvugt /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\test.test.dll\"" /SC ONCE /Z /ST 22:55 /ET 23:074⤵
- Creates scheduled task(s)
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\test.test.dll"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\test.test.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Owame" /d "0"4⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Iojdmno" /d "0"4⤵
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\test.test.dll"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\test.test.dll"2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 5963⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\test.test.dllMD5
ed3b43ef66f58f891cc51cacc79b0b72
SHA102cfa19d275c96fafad6b3e440b220200b839f99
SHA2569c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7
SHA51273913ebf9895625de2b4a4e5c4534164f79b708bfc1338aade1d90aae57836bd7ea79e2a32976b138d8d5ab1d877ec5997428461acb588e732ec49ab8235d116
-
C:\Users\Admin\AppData\Local\Temp\test.test.dllMD5
83aa0f585f885db7ea32b8b38060df9f
SHA1180bde533d03dbcad86dd4a7cade5cebc7df7d7d
SHA256266faa5fab81575b32be38012258449bfea523b04ce9b29353953fb4b6dd74de
SHA5120018a52019b082ee75128158f30860a2cdcf0e422cc6a2ad119ae8667d454be30fda86a9f047f30cb411699d57b2a8ea3b10bbf6b6e346c986dc2468024608bf
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\test.test.dllMD5
ed3b43ef66f58f891cc51cacc79b0b72
SHA102cfa19d275c96fafad6b3e440b220200b839f99
SHA2569c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7
SHA51273913ebf9895625de2b4a4e5c4534164f79b708bfc1338aade1d90aae57836bd7ea79e2a32976b138d8d5ab1d877ec5997428461acb588e732ec49ab8235d116
-
\Users\Admin\AppData\Local\Temp\test.test.dllMD5
83aa0f585f885db7ea32b8b38060df9f
SHA1180bde533d03dbcad86dd4a7cade5cebc7df7d7d
SHA256266faa5fab81575b32be38012258449bfea523b04ce9b29353953fb4b6dd74de
SHA5120018a52019b082ee75128158f30860a2cdcf0e422cc6a2ad119ae8667d454be30fda86a9f047f30cb411699d57b2a8ea3b10bbf6b6e346c986dc2468024608bf
-
memory/1032-128-0x0000000000000000-mapping.dmp
-
memory/1108-114-0x0000000000000000-mapping.dmp
-
memory/1108-115-0x0000000004550000-0x0000000004593000-memory.dmpFilesize
268KB
-
memory/1108-116-0x0000000010000000-0x0000000010055000-memory.dmpFilesize
340KB
-
memory/1200-127-0x0000000000000000-mapping.dmp
-
memory/1200-132-0x0000000002A00000-0x0000000002A21000-memory.dmpFilesize
132KB
-
memory/1252-121-0x0000000002CF0000-0x0000000002D11000-memory.dmpFilesize
132KB
-
memory/1252-117-0x0000000000000000-mapping.dmp
-
memory/1344-134-0x0000000000000000-mapping.dmp
-
memory/1368-118-0x0000000000000000-mapping.dmp
-
memory/1568-129-0x0000000000000000-mapping.dmp
-
memory/3888-123-0x0000000000000000-mapping.dmp
-
memory/3888-125-0x0000000003950000-0x0000000003993000-memory.dmpFilesize
268KB