Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
04-12-2021 04:42
Static task
static1
Behavioral task
behavioral1
Sample
c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe
Resource
win10-en-20211104
General
-
Target
c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe
-
Size
247KB
-
MD5
79230eab7cf29f52f36113258f1fb376
-
SHA1
0de5cb18e7b953c82dd5af40b0c2418dd28774e9
-
SHA256
c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15
-
SHA512
d3aeb3cc1480d0c1be498f7db9f0bd7203d26ae92e08814742482a67552bfd273ae295e201b36d708d14bf4cfdad636647eeccf082e0c1a01cec912337d9d7af
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Extracted
remcos
3.3.2 Pro
J3J3-US
kent0mushinec0n3t.casacam.net:32095
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Pin.exe
-
copy_folder
J3J3-US
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
J3J3-US
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-TFIQE4
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
J3J3-US
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Extracted
raccoon
1.8.3-hotfix
b620be4c85b4051a92040003edbc322be4eb082d
-
url4cnc
http://91.219.236.207/capibar
http://185.225.19.18/capibar
http://91.219.237.227/capibar
https://t.me/capibar
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1748-144-0x00000000011C0000-0x0000000001335000-memory.dmp family_redline behavioral1/memory/1416-174-0x0000000000060000-0x00000000001C8000-memory.dmp family_redline behavioral1/memory/484-197-0x0000000000AA0000-0x0000000000BB0000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 2544 created 1552 2544 WerFault.exe 2567.exe PID 3548 created 3396 3548 WerFault.exe 7D7B.exe -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
Processes:
1827.exe1827.exe2567.exe7D7B.exe85B9.exe8CFE.exe7D7B.exe9943.exeAA6B.exePin.exepid process 1788 1827.exe 868 1827.exe 1552 2567.exe 716 7D7B.exe 1748 85B9.exe 3464 8CFE.exe 3396 7D7B.exe 1416 9943.exe 484 AA6B.exe 1060 Pin.exe -
Deletes itself 1 IoCs
Processes:
pid process 3056 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
8CFE.exePin.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 8CFE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\J3J3-US = "\"C:\\Users\\Admin\\AppData\\Roaming\\J3J3-US\\Pin.exe\"" 8CFE.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Pin.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\J3J3-US = "\"C:\\Users\\Admin\\AppData\\Roaming\\J3J3-US\\Pin.exe\"" Pin.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
9943.exepid process 1416 9943.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe1827.exe7D7B.exePin.exedescription pid process target process PID 3068 set thread context of 2904 3068 c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe PID 1788 set thread context of 868 1788 1827.exe 1827.exe PID 716 set thread context of 3396 716 7D7B.exe 7D7B.exe PID 1060 set thread context of 1580 1060 Pin.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 34 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2544 1552 WerFault.exe 2567.exe 3204 3464 WerFault.exe 8CFE.exe 2072 3464 WerFault.exe 8CFE.exe 1360 3464 WerFault.exe 8CFE.exe 3756 3464 WerFault.exe 8CFE.exe 2572 3464 WerFault.exe 8CFE.exe 3068 3464 WerFault.exe 8CFE.exe 3308 3464 WerFault.exe 8CFE.exe 2212 1060 WerFault.exe Pin.exe 3948 1060 WerFault.exe Pin.exe 1120 1060 WerFault.exe Pin.exe 948 1060 WerFault.exe Pin.exe 2928 1060 WerFault.exe Pin.exe 1324 1060 WerFault.exe Pin.exe 2692 1060 WerFault.exe Pin.exe 708 1060 WerFault.exe Pin.exe 3980 1060 WerFault.exe Pin.exe 3308 1060 WerFault.exe Pin.exe 3868 1060 WerFault.exe Pin.exe 3776 1060 WerFault.exe Pin.exe 1788 1060 WerFault.exe Pin.exe 2496 1060 WerFault.exe Pin.exe 3548 3396 WerFault.exe 7D7B.exe 1388 1060 WerFault.exe Pin.exe 3016 1060 WerFault.exe Pin.exe 1748 1060 WerFault.exe Pin.exe 4040 1060 WerFault.exe Pin.exe 1196 1060 WerFault.exe Pin.exe 484 1060 WerFault.exe Pin.exe 3196 1060 WerFault.exe Pin.exe 3132 1060 WerFault.exe Pin.exe 1428 1060 WerFault.exe Pin.exe 3404 1060 WerFault.exe Pin.exe 1952 1060 WerFault.exe Pin.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1827.exec292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1827.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1827.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1827.exe -
Modifies registry class 1 IoCs
Processes:
8CFE.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings 8CFE.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exepid process 2904 c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe 2904 c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Pin.exepid process 3056 1060 Pin.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe1827.exepid process 2904 c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe 868 1827.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exe9943.exeAA6B.exe85B9.exeWerFault.exedescription pid process Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeRestorePrivilege 2544 WerFault.exe Token: SeBackupPrivilege 2544 WerFault.exe Token: SeDebugPrivilege 2544 WerFault.exe Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeDebugPrivilege 3204 WerFault.exe Token: SeDebugPrivilege 2072 WerFault.exe Token: SeDebugPrivilege 1360 WerFault.exe Token: SeDebugPrivilege 3756 WerFault.exe Token: SeDebugPrivilege 2572 WerFault.exe Token: SeDebugPrivilege 3068 WerFault.exe Token: SeDebugPrivilege 3308 WerFault.exe Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeDebugPrivilege 1416 9943.exe Token: SeDebugPrivilege 484 AA6B.exe Token: SeDebugPrivilege 1748 85B9.exe Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeDebugPrivilege 2212 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Pin.exepid process 1060 Pin.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe1827.exe7D7B.exe8CFE.exeWScript.execmd.exePin.exedescription pid process target process PID 3068 wrote to memory of 2904 3068 c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe PID 3068 wrote to memory of 2904 3068 c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe PID 3068 wrote to memory of 2904 3068 c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe PID 3068 wrote to memory of 2904 3068 c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe PID 3068 wrote to memory of 2904 3068 c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe PID 3068 wrote to memory of 2904 3068 c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe PID 3056 wrote to memory of 1788 3056 1827.exe PID 3056 wrote to memory of 1788 3056 1827.exe PID 3056 wrote to memory of 1788 3056 1827.exe PID 1788 wrote to memory of 868 1788 1827.exe 1827.exe PID 1788 wrote to memory of 868 1788 1827.exe 1827.exe PID 1788 wrote to memory of 868 1788 1827.exe 1827.exe PID 1788 wrote to memory of 868 1788 1827.exe 1827.exe PID 1788 wrote to memory of 868 1788 1827.exe 1827.exe PID 1788 wrote to memory of 868 1788 1827.exe 1827.exe PID 3056 wrote to memory of 1552 3056 2567.exe PID 3056 wrote to memory of 1552 3056 2567.exe PID 3056 wrote to memory of 1552 3056 2567.exe PID 3056 wrote to memory of 716 3056 7D7B.exe PID 3056 wrote to memory of 716 3056 7D7B.exe PID 3056 wrote to memory of 716 3056 7D7B.exe PID 3056 wrote to memory of 1748 3056 85B9.exe PID 3056 wrote to memory of 1748 3056 85B9.exe PID 3056 wrote to memory of 1748 3056 85B9.exe PID 3056 wrote to memory of 3464 3056 8CFE.exe PID 3056 wrote to memory of 3464 3056 8CFE.exe PID 3056 wrote to memory of 3464 3056 8CFE.exe PID 716 wrote to memory of 3396 716 7D7B.exe 7D7B.exe PID 716 wrote to memory of 3396 716 7D7B.exe 7D7B.exe PID 716 wrote to memory of 3396 716 7D7B.exe 7D7B.exe PID 716 wrote to memory of 3396 716 7D7B.exe 7D7B.exe PID 716 wrote to memory of 3396 716 7D7B.exe 7D7B.exe PID 716 wrote to memory of 3396 716 7D7B.exe 7D7B.exe PID 716 wrote to memory of 3396 716 7D7B.exe 7D7B.exe PID 716 wrote to memory of 3396 716 7D7B.exe 7D7B.exe PID 716 wrote to memory of 3396 716 7D7B.exe 7D7B.exe PID 3056 wrote to memory of 1416 3056 9943.exe PID 3056 wrote to memory of 1416 3056 9943.exe PID 3056 wrote to memory of 1416 3056 9943.exe PID 3056 wrote to memory of 484 3056 AA6B.exe PID 3056 wrote to memory of 484 3056 AA6B.exe PID 3056 wrote to memory of 484 3056 AA6B.exe PID 3464 wrote to memory of 2004 3464 8CFE.exe WScript.exe PID 3464 wrote to memory of 2004 3464 8CFE.exe WScript.exe PID 3464 wrote to memory of 2004 3464 8CFE.exe WScript.exe PID 2004 wrote to memory of 1508 2004 WScript.exe cmd.exe PID 2004 wrote to memory of 1508 2004 WScript.exe cmd.exe PID 2004 wrote to memory of 1508 2004 WScript.exe cmd.exe PID 1508 wrote to memory of 1060 1508 cmd.exe Pin.exe PID 1508 wrote to memory of 1060 1508 cmd.exe Pin.exe PID 1508 wrote to memory of 1060 1508 cmd.exe Pin.exe PID 1060 wrote to memory of 1580 1060 Pin.exe svchost.exe PID 1060 wrote to memory of 1580 1060 Pin.exe svchost.exe PID 1060 wrote to memory of 1580 1060 Pin.exe svchost.exe PID 1060 wrote to memory of 1580 1060 Pin.exe svchost.exe PID 1060 wrote to memory of 1580 1060 Pin.exe svchost.exe PID 1060 wrote to memory of 1580 1060 Pin.exe svchost.exe PID 1060 wrote to memory of 1580 1060 Pin.exe svchost.exe PID 1060 wrote to memory of 1580 1060 Pin.exe svchost.exe PID 1060 wrote to memory of 1580 1060 Pin.exe svchost.exe PID 1060 wrote to memory of 1580 1060 Pin.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe"C:\Users\Admin\AppData\Local\Temp\c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe"C:\Users\Admin\AppData\Local\Temp\c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\1827.exeC:\Users\Admin\AppData\Local\Temp\1827.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\1827.exeC:\Users\Admin\AppData\Local\Temp\1827.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\2567.exeC:\Users\Admin\AppData\Local\Temp\2567.exe1⤵
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 4762⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\7D7B.exeC:\Users\Admin\AppData\Local\Temp\7D7B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\7D7B.exeC:\Users\Admin\AppData\Local\Temp\7D7B.exe2⤵
- Executes dropped EXE
PID:3396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3396 -s 8723⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:3548
-
-
-
C:\Users\Admin\AppData\Local\Temp\85B9.exeC:\Users\Admin\AppData\Local\Temp\85B9.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
C:\Users\Admin\AppData\Local\Temp\8CFE.exeC:\Users\Admin\AppData\Local\Temp\8CFE.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 6282⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 9802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 10602⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 11002⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 9602⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 9762⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 11042⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\J3J3-US\Pin.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Roaming\J3J3-US\Pin.exeC:\Users\Admin\AppData\Roaming\J3J3-US\Pin.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 7045⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 7285⤵
- Program crash
PID:3948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 6485⤵
- Program crash
PID:1120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 7045⤵
- Program crash
PID:948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 8205⤵
- Program crash
PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 7405⤵
- Program crash
PID:1324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 8845⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 9285⤵
- Program crash
PID:708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 10045⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 10325⤵
- Program crash
PID:3308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 10845⤵
- Program crash
PID:3868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 11685⤵
- Program crash
PID:3776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 12045⤵
- Program crash
PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 10085⤵
- Program crash
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 11205⤵
- Program crash
PID:1388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 13725⤵
- Program crash
PID:3016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 14165⤵
- Program crash
PID:1748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 13565⤵
- Program crash
PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 8125⤵
- Program crash
PID:1196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 13925⤵
- Program crash
PID:484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 15005⤵
- Program crash
PID:3196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 10365⤵
- Program crash
PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 13085⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 14125⤵
- Program crash
PID:3404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 13205⤵
- Program crash
PID:1952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9943.exeC:\Users\Admin\AppData\Local\Temp\9943.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
C:\Users\Admin\AppData\Local\Temp\AA6B.exeC:\Users\Admin\AppData\Local\Temp\AA6B.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
79230eab7cf29f52f36113258f1fb376
SHA10de5cb18e7b953c82dd5af40b0c2418dd28774e9
SHA256c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15
SHA512d3aeb3cc1480d0c1be498f7db9f0bd7203d26ae92e08814742482a67552bfd273ae295e201b36d708d14bf4cfdad636647eeccf082e0c1a01cec912337d9d7af
-
MD5
79230eab7cf29f52f36113258f1fb376
SHA10de5cb18e7b953c82dd5af40b0c2418dd28774e9
SHA256c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15
SHA512d3aeb3cc1480d0c1be498f7db9f0bd7203d26ae92e08814742482a67552bfd273ae295e201b36d708d14bf4cfdad636647eeccf082e0c1a01cec912337d9d7af
-
MD5
79230eab7cf29f52f36113258f1fb376
SHA10de5cb18e7b953c82dd5af40b0c2418dd28774e9
SHA256c292df0e4cbc0a1f35a3c08cf1fd0dbee10a220d1e64c9243b3006dc2516ec15
SHA512d3aeb3cc1480d0c1be498f7db9f0bd7203d26ae92e08814742482a67552bfd273ae295e201b36d708d14bf4cfdad636647eeccf082e0c1a01cec912337d9d7af
-
MD5
df13fac0d8b182e4d8b9a02ba87a9571
SHA1b2187debc6fde96e08d5014ce4f1af5cf568bce5
SHA256af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3
SHA512bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816
-
MD5
df13fac0d8b182e4d8b9a02ba87a9571
SHA1b2187debc6fde96e08d5014ce4f1af5cf568bce5
SHA256af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3
SHA512bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816
-
MD5
61a3807e15231687f38358e3ae6b670c
SHA1b577ef08f60b55811aa5b8b93e5b3755b899115f
SHA25656283f214f84bf23a55813990e2147767f71a61c6158ed1e5e9178527a6f90f1
SHA5128dfe85f3779d08a083e6be58d8ea9638daa1fe03716e1a8a88ab9be90cd9fa03a6c05c8e7e6ab37a2d729fe422c8a280133ea4cc2820d140a71b6eb78231b9f4
-
MD5
61a3807e15231687f38358e3ae6b670c
SHA1b577ef08f60b55811aa5b8b93e5b3755b899115f
SHA25656283f214f84bf23a55813990e2147767f71a61c6158ed1e5e9178527a6f90f1
SHA5128dfe85f3779d08a083e6be58d8ea9638daa1fe03716e1a8a88ab9be90cd9fa03a6c05c8e7e6ab37a2d729fe422c8a280133ea4cc2820d140a71b6eb78231b9f4
-
MD5
61a3807e15231687f38358e3ae6b670c
SHA1b577ef08f60b55811aa5b8b93e5b3755b899115f
SHA25656283f214f84bf23a55813990e2147767f71a61c6158ed1e5e9178527a6f90f1
SHA5128dfe85f3779d08a083e6be58d8ea9638daa1fe03716e1a8a88ab9be90cd9fa03a6c05c8e7e6ab37a2d729fe422c8a280133ea4cc2820d140a71b6eb78231b9f4
-
MD5
4df0d4be3b3abb5ca237d11013411885
SHA17b9376e633769eb52a70ec887143826f924f6fee
SHA2562cf6a392704eb1ede9545577028283a714d4abd1b53318ca11b3075dee799813
SHA51214e1543c4f8a5c331ef1de493c7aaf8e2ade61b6a4cc9e15e2e3ce988be4cd5c72a2558c78e39ebe8f71de592945192df7cb2093ce71d62d5a417f5cf6858db7
-
MD5
4df0d4be3b3abb5ca237d11013411885
SHA17b9376e633769eb52a70ec887143826f924f6fee
SHA2562cf6a392704eb1ede9545577028283a714d4abd1b53318ca11b3075dee799813
SHA51214e1543c4f8a5c331ef1de493c7aaf8e2ade61b6a4cc9e15e2e3ce988be4cd5c72a2558c78e39ebe8f71de592945192df7cb2093ce71d62d5a417f5cf6858db7
-
MD5
6f78f5cf377470fc449263eaf2231dac
SHA1067211e73b880a6a7c9c01ac2c309ea49579ad1f
SHA2562fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9
SHA512cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c
-
MD5
6f78f5cf377470fc449263eaf2231dac
SHA1067211e73b880a6a7c9c01ac2c309ea49579ad1f
SHA2562fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9
SHA512cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c
-
MD5
4d96f213bfbba34ffba4986724d3a99c
SHA1b7dfe9e3a186bf0d0a0e3793c84cd83d23b4c526
SHA256f901c29eb448ec4288c6215ba6af0ce804009b69e6505ab35f1037f23851f5b7
SHA5124e333f8fd1fca9784deb59c12645be1b68e12771dbc77f48419365df7da46638b40bb0a00f0640225a1ee652096c0f3cf7ebd12ed3463afb24f7df27c3717937
-
MD5
4d96f213bfbba34ffba4986724d3a99c
SHA1b7dfe9e3a186bf0d0a0e3793c84cd83d23b4c526
SHA256f901c29eb448ec4288c6215ba6af0ce804009b69e6505ab35f1037f23851f5b7
SHA5124e333f8fd1fca9784deb59c12645be1b68e12771dbc77f48419365df7da46638b40bb0a00f0640225a1ee652096c0f3cf7ebd12ed3463afb24f7df27c3717937
-
MD5
40f480638f2e8462929a662217a64c5b
SHA1e72a9399e1ba8d61f26ba9a6e300e92d8bcd656e
SHA2564602413ecd189f0a449f0ae14ba743d35a1b179bb6d2dc227dec2dd048611f60
SHA512da9a5d796821f9fc648e2a8b0ccda133f1f276b2c55cc06b5cf158da805b1c6147348fc2e5f8177a96c78d9b178bb1321fd693dcf615f10584d2ae90a689c365
-
MD5
40f480638f2e8462929a662217a64c5b
SHA1e72a9399e1ba8d61f26ba9a6e300e92d8bcd656e
SHA2564602413ecd189f0a449f0ae14ba743d35a1b179bb6d2dc227dec2dd048611f60
SHA512da9a5d796821f9fc648e2a8b0ccda133f1f276b2c55cc06b5cf158da805b1c6147348fc2e5f8177a96c78d9b178bb1321fd693dcf615f10584d2ae90a689c365
-
MD5
4dfb330bb0127158bf08c5cb987ec765
SHA17357c3ba13c1c3c8676a89cb07d23bc098884c0c
SHA25654a5f2b8e939ae1f0a15629a8e458e0fce4df5dc8500680701d96e4cd20bb440
SHA512bf314caa427233632b092441ada2d9ce42b98305716d5c8f6e8cc8604dbca657822588e066b65620cf8553fea3306949ac6651ee24cf0b7dc8ede811be1fc2a2
-
MD5
6f78f5cf377470fc449263eaf2231dac
SHA1067211e73b880a6a7c9c01ac2c309ea49579ad1f
SHA2562fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9
SHA512cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c
-
MD5
6f78f5cf377470fc449263eaf2231dac
SHA1067211e73b880a6a7c9c01ac2c309ea49579ad1f
SHA2562fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9
SHA512cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c