Analysis
-
max time kernel
50s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
26/05/2022, 20:00
Behavioral task
behavioral1
Sample
b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Resource
win10v2004-20220414-en
General
-
Target
b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
-
Size
131KB
-
MD5
c4f79edc4498c5570495bb36fc942134
-
SHA1
00046b588252502480e8e708a22d25ae1d9b05fa
-
SHA256
b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
-
SHA512
07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
Malware Config
Extracted
blacknet
v3.5 Public
HacKed
http://finalb.xyz/NiggaNet
BN[RqfcWolJ-7232457]
-
antivm
true
-
elevate_uac
false
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
df7427b5e05183e625345c3c37ef31c0
-
startup
true
-
usb_spread
true
Signatures
-
BlackNET Payload 28 IoCs
resource yara_rule behavioral2/files/0x00060000000231bf-138.dat family_blacknet behavioral2/files/0x00060000000231bf-139.dat family_blacknet behavioral2/files/0x00060000000231ba-152.dat family_blacknet behavioral2/files/0x00070000000231bf-166.dat family_blacknet behavioral2/files/0x00070000000231bf-165.dat family_blacknet behavioral2/files/0x00060000000231ba-170.dat family_blacknet behavioral2/files/0x00080000000231bf-183.dat family_blacknet behavioral2/files/0x00080000000231bf-184.dat family_blacknet behavioral2/files/0x00060000000231ba-188.dat family_blacknet behavioral2/files/0x00060000000231ba-200.dat family_blacknet behavioral2/files/0x00060000000231ba-203.dat family_blacknet behavioral2/files/0x00060000000231ba-206.dat family_blacknet behavioral2/files/0x00060000000231ba-209.dat family_blacknet behavioral2/files/0x00060000000231ba-212.dat family_blacknet behavioral2/files/0x00060000000231ba-215.dat family_blacknet behavioral2/files/0x00060000000231ba-218.dat family_blacknet behavioral2/files/0x00060000000231ba-221.dat family_blacknet behavioral2/files/0x00060000000231ba-224.dat family_blacknet behavioral2/files/0x00060000000231ba-227.dat family_blacknet behavioral2/files/0x00060000000231ba-230.dat family_blacknet behavioral2/files/0x00060000000231ba-233.dat family_blacknet behavioral2/files/0x00060000000231ba-236.dat family_blacknet behavioral2/files/0x00060000000231ba-239.dat family_blacknet behavioral2/files/0x00060000000231ba-242.dat family_blacknet behavioral2/files/0x00060000000231ba-245.dat family_blacknet behavioral2/files/0x00060000000231ba-248.dat family_blacknet behavioral2/files/0x00060000000231ba-251.dat family_blacknet behavioral2/files/0x00060000000231ba-254.dat family_blacknet -
Contains code to disable Windows Defender 28 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x00060000000231bf-138.dat disable_win_def behavioral2/files/0x00060000000231bf-139.dat disable_win_def behavioral2/files/0x00060000000231ba-152.dat disable_win_def behavioral2/files/0x00070000000231bf-166.dat disable_win_def behavioral2/files/0x00070000000231bf-165.dat disable_win_def behavioral2/files/0x00060000000231ba-170.dat disable_win_def behavioral2/files/0x00080000000231bf-183.dat disable_win_def behavioral2/files/0x00080000000231bf-184.dat disable_win_def behavioral2/files/0x00060000000231ba-188.dat disable_win_def behavioral2/files/0x00060000000231ba-200.dat disable_win_def behavioral2/files/0x00060000000231ba-203.dat disable_win_def behavioral2/files/0x00060000000231ba-206.dat disable_win_def behavioral2/files/0x00060000000231ba-209.dat disable_win_def behavioral2/files/0x00060000000231ba-212.dat disable_win_def behavioral2/files/0x00060000000231ba-215.dat disable_win_def behavioral2/files/0x00060000000231ba-218.dat disable_win_def behavioral2/files/0x00060000000231ba-221.dat disable_win_def behavioral2/files/0x00060000000231ba-224.dat disable_win_def behavioral2/files/0x00060000000231ba-227.dat disable_win_def behavioral2/files/0x00060000000231ba-230.dat disable_win_def behavioral2/files/0x00060000000231ba-233.dat disable_win_def behavioral2/files/0x00060000000231ba-236.dat disable_win_def behavioral2/files/0x00060000000231ba-239.dat disable_win_def behavioral2/files/0x00060000000231ba-242.dat disable_win_def behavioral2/files/0x00060000000231ba-245.dat disable_win_def behavioral2/files/0x00060000000231ba-248.dat disable_win_def behavioral2/files/0x00060000000231ba-251.dat disable_win_def behavioral2/files/0x00060000000231ba-254.dat disable_win_def -
Executes dropped EXE 3 IoCs
pid Process 2024 WindowsUpdate.exe 400 svchosts.exe 1612 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation svchosts.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\df7427b5e05183e625345c3c37ef31c0 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe" b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\df7427b5e05183e625345c3c37ef31c0 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\MyClient\\WindowsUpdate.exe" b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\df7427b5e05183e625345c3c37ef31c0 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\MyClient\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\df7427b5e05183e625345c3c37ef31c0 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe" b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4076 2024 WerFault.exe 84 3020 1612 WerFault.exe 88 3884 1612 WerFault.exe 88 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe Token: SeDebugPrivilege 400 svchosts.exe Token: SeDebugPrivilege 2024 WindowsUpdate.exe Token: SeBackupPrivilege 440 dw20.exe Token: SeBackupPrivilege 440 dw20.exe Token: SeDebugPrivilege 1612 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 2024 WindowsUpdate.exe 2024 WindowsUpdate.exe 1612 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 1612 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2024 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 84 PID 2860 wrote to memory of 2024 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 84 PID 2860 wrote to memory of 400 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 85 PID 2860 wrote to memory of 400 2860 b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe 85 PID 2024 wrote to memory of 440 2024 WindowsUpdate.exe 86 PID 2024 wrote to memory of 440 2024 WindowsUpdate.exe 86 PID 400 wrote to memory of 1612 400 svchosts.exe 88 PID 400 wrote to memory of 1612 400 svchosts.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe"C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 113003⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2024 -s 308883⤵
- Program crash
PID:4076
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchosts.exe"C:\Users\Admin\AppData\Local\Temp\svchosts.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe"C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe"4⤵PID:3164
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 141844⤵PID:2748
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1612 -s 140884⤵
- Program crash
PID:3020
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1612 -s 140884⤵
- Program crash
PID:3884
-
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:388
-
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe"C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe"4⤵PID:4648
-
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:456
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:3296
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"3⤵PID:1368
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 2024 -ip 20241⤵PID:3128
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 536 -p 1612 -ip 16121⤵PID:1052
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 556 -p 1612 -ip 16121⤵PID:884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
594B
MD544e889763d548d09132c31ed548f63f5
SHA1d9829a1b5841338533a0be0509df50172cce73be
SHA256d29f0e5fe1ab31998f200d4441c0e201a2e3bd6e416f638cbee2eb55354d48cc
SHA512a1474aaef1132f459e8139157a618368c7623f4a25a754c6fc2672d92929b9506bfcc272eebf5c69901f4140d36e740f5f6bbfb90e000c6538ab492f5aa48a96
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe.log
Filesize866B
MD5d7d09fe4ff702ba9f25d5f48923708b6
SHA185ce2b7a1c9a4c3252fc9f471cf13ad50ad2cf65
SHA256ae5b9b53869ba7b6bf99b07cb09c9ce9ff11d4abbbb626570390f9fba4f6f462
SHA512500a313cc36a23302763d6957516640c981da2fbab691c8b66518f5b0051e25dfb1b09449efff526eab707fa1be36ef9362286869c82b3800e42d2d8287ef1cf
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
Filesize131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
Filesize
17KB
MD589dd6e72358a669b7d6e2348307a7af7
SHA10db348f3c6114a45d71f4d218e0e088b71c7bb0a
SHA256ad34794058212006ae974fcc6a0242598e6d020f08044439e3512773cd402b7e
SHA51293b8a47686d7491281a0809b138a6244a535302ba0d6b2146849e9888632c72b6223ae8eb7a24f1006aaf57ab947a8f43719cff4837df559e7bf42f52c63856b
-
Filesize
17KB
MD589dd6e72358a669b7d6e2348307a7af7
SHA10db348f3c6114a45d71f4d218e0e088b71c7bb0a
SHA256ad34794058212006ae974fcc6a0242598e6d020f08044439e3512773cd402b7e
SHA51293b8a47686d7491281a0809b138a6244a535302ba0d6b2146849e9888632c72b6223ae8eb7a24f1006aaf57ab947a8f43719cff4837df559e7bf42f52c63856b
-
Filesize
131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
Filesize
131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
Filesize
131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
Filesize
131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
Filesize
131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
Filesize
131KB
MD5c4f79edc4498c5570495bb36fc942134
SHA100046b588252502480e8e708a22d25ae1d9b05fa
SHA256b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
SHA51207bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef
-
Filesize
17KB
MD589dd6e72358a669b7d6e2348307a7af7
SHA10db348f3c6114a45d71f4d218e0e088b71c7bb0a
SHA256ad34794058212006ae974fcc6a0242598e6d020f08044439e3512773cd402b7e
SHA51293b8a47686d7491281a0809b138a6244a535302ba0d6b2146849e9888632c72b6223ae8eb7a24f1006aaf57ab947a8f43719cff4837df559e7bf42f52c63856b