Analysis

  • max time kernel
    157s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220722-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2022 17:30

General

  • Target

    3-FRQ MOQ 001 08 2022PDT.exe

  • Size

    1.2MB

  • MD5

    105c2d0f5e8b8202ff79c97392855544

  • SHA1

    d14307bfae983cde57dad14172d3a65258e9ba4e

  • SHA256

    e6da15aedc54f4b4faa8df84038a7172eb010fcaa4caeb3008e7fd371597f973

  • SHA512

    6072430cce7bc853e392f3f8ec63ba715e246b0ea36905df0523e9f0f61de3d06707cb56d1a86437c1ac047d874bab8b2fde58049e5fd9aaf0b56be9af063be5

Malware Config

Extracted

Family

warzonerat

C2

toomuchego.ydns.eu:5200

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 11 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Windows security bypass 2 TTPs 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Program crash 29 IoCs
  • Suspicious use of SetThreadContext 30 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3-FRQ MOQ 001 08 2022PDT.exe
    "C:\Users\Admin\AppData\Local\Temp\3-FRQ MOQ 001 08 2022PDT.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Users\Admin\AppData\Local\Temp\3-FRQ MOQ 001 08 2022PDT.exe
      "{path}"
      2⤵
        PID:616
      • C:\Users\Admin\AppData\Local\Temp\3-FRQ MOQ 001 08 2022PDT.exe
        "{path}"
        2⤵
          PID:1072
        • C:\Users\Admin\AppData\Local\Temp\3-FRQ MOQ 001 08 2022PDT.exe
          "{path}"
          2⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:1140
          • C:\Users\Admin\AppData\Local\Temp\EGGMM.EXE
            "C:\Users\Admin\AppData\Local\Temp\EGGMM.EXE"
            3⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:256
          • C:\Users\Admin\AppData\Local\Temp\WXS.EXE
            "C:\Users\Admin\AppData\Local\Temp\WXS.EXE"
            3⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:1820
            • C:\Users\Admin\AppData\Local\Temp\EGGMM.EXE
              "C:\Users\Admin\AppData\Local\Temp\EGGMM.EXE"
              4⤵
              • Executes dropped EXE
              • Accesses Microsoft Outlook profiles
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4488
            • C:\Users\Admin\AppData\Local\Temp\GUM.EXE
              "C:\Users\Admin\AppData\Local\Temp\GUM.EXE"
              4⤵
              • UAC bypass
              • Windows security bypass
              • Executes dropped EXE
              • Windows security modification
              • Checks whether UAC is enabled
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:5048
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                5⤵
                  PID:4992
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 84
                    6⤵
                    • Program crash
                    PID:3428
                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                  C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                  5⤵
                    PID:1476
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 84
                      6⤵
                      • Program crash
                      PID:1680
                  • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                    C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                    5⤵
                      PID:3176
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 84
                        6⤵
                        • Program crash
                        PID:1228
                    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                      5⤵
                        PID:5112
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 84
                          6⤵
                          • Program crash
                          PID:2220
                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                        5⤵
                          PID:2768
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 84
                            6⤵
                            • Program crash
                            PID:5004
                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                          C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                          5⤵
                            PID:4972
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 84
                              6⤵
                              • Program crash
                              PID:2944
                          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                            C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                            5⤵
                              PID:3616
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 84
                                6⤵
                                • Program crash
                                PID:4576
                            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                              5⤵
                                PID:3372
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 84
                                  6⤵
                                  • Program crash
                                  PID:3768
                              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                5⤵
                                  PID:2928
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 84
                                    6⤵
                                    • Program crash
                                    PID:3088
                                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                  5⤵
                                    PID:3672
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 84
                                      6⤵
                                      • Program crash
                                      PID:4996
                                  • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                    C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                    5⤵
                                      PID:3068
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 84
                                        6⤵
                                        • Program crash
                                        PID:868
                                    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                      C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                      5⤵
                                        PID:3872
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 84
                                          6⤵
                                          • Program crash
                                          PID:3132
                                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                        C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                        5⤵
                                          PID:3660
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 84
                                            6⤵
                                            • Program crash
                                            PID:5104
                                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                          C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                          5⤵
                                            PID:616
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 616 -s 84
                                              6⤵
                                              • Program crash
                                              PID:2164
                                          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                            5⤵
                                              PID:3792
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 84
                                                6⤵
                                                • Program crash
                                                PID:384
                                            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                              5⤵
                                                PID:2200
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 84
                                                  6⤵
                                                  • Program crash
                                                  PID:3368
                                              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                5⤵
                                                  PID:3736
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 84
                                                    6⤵
                                                    • Program crash
                                                    PID:4576
                                                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                  C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                  5⤵
                                                    PID:2032
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 84
                                                      6⤵
                                                      • Program crash
                                                      PID:4996
                                                  • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                    C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                    5⤵
                                                      PID:3168
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 84
                                                        6⤵
                                                        • Program crash
                                                        PID:3720
                                                    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                      C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                      5⤵
                                                        PID:2560
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 84
                                                          6⤵
                                                          • Program crash
                                                          PID:4160
                                                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                        C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                        5⤵
                                                          PID:4576
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 12
                                                            6⤵
                                                            • Program crash
                                                            PID:2204
                                                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                          C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                          5⤵
                                                            PID:1540
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 84
                                                              6⤵
                                                              • Program crash
                                                              PID:3536
                                                          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                            C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                            5⤵
                                                              PID:2780
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 84
                                                                6⤵
                                                                • Program crash
                                                                PID:1684
                                                            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                              C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                              5⤵
                                                                PID:5004
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 84
                                                                  6⤵
                                                                  • Program crash
                                                                  PID:3132
                                                              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                                5⤵
                                                                  PID:2820
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 84
                                                                    6⤵
                                                                    • Program crash
                                                                    PID:3476
                                                                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                                  5⤵
                                                                    PID:2128
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 84
                                                                      6⤵
                                                                      • Program crash
                                                                      PID:4952
                                                                  • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                                    5⤵
                                                                      PID:868
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 84
                                                                        6⤵
                                                                        • Program crash
                                                                        PID:4204
                                                                    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                                      5⤵
                                                                        PID:384
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 84
                                                                          6⤵
                                                                          • Program crash
                                                                          PID:768
                                                                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                                        5⤵
                                                                          PID:2612
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 84
                                                                            6⤵
                                                                            • Program crash
                                                                            PID:5040
                                                                      • C:\Users\Admin\AppData\Local\Temp\WALL PAPER.EXE
                                                                        "C:\Users\Admin\AppData\Local\Temp\WALL PAPER.EXE"
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of WriteProcessMemory
                                                                        PID:3108
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"
                                                                          5⤵
                                                                          • Suspicious use of WriteProcessMemory
                                                                          PID:2876
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"
                                                                            6⤵
                                                                              PID:3932
                                                                          • C:\ProgramData\images.exe
                                                                            "C:\ProgramData\images.exe"
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            • Loads dropped DLL
                                                                            • Accesses Microsoft Outlook profiles
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            • Suspicious use of WriteProcessMemory
                                                                            • outlook_office_path
                                                                            • outlook_win_path
                                                                            PID:3764
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe"
                                                                              6⤵
                                                                                PID:3152
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4992 -ip 4992
                                                                      1⤵
                                                                        PID:3344
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1476 -ip 1476
                                                                        1⤵
                                                                          PID:1184
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3176 -ip 3176
                                                                          1⤵
                                                                            PID:1392
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5112 -ip 5112
                                                                            1⤵
                                                                              PID:744
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2768 -ip 2768
                                                                              1⤵
                                                                                PID:380
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4972 -ip 4972
                                                                                1⤵
                                                                                  PID:1540
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3616 -ip 3616
                                                                                  1⤵
                                                                                    PID:3408
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3372 -ip 3372
                                                                                    1⤵
                                                                                      PID:388
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2928 -ip 2928
                                                                                      1⤵
                                                                                        PID:3640
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3672 -ip 3672
                                                                                        1⤵
                                                                                          PID:1684
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3068 -ip 3068
                                                                                          1⤵
                                                                                            PID:816
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3872 -ip 3872
                                                                                            1⤵
                                                                                              PID:1316
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3660 -ip 3660
                                                                                              1⤵
                                                                                                PID:2492
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 616 -ip 616
                                                                                                1⤵
                                                                                                  PID:1072
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3792 -ip 3792
                                                                                                  1⤵
                                                                                                    PID:1588
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 2200 -ip 2200
                                                                                                    1⤵
                                                                                                      PID:3824
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 3736 -ip 3736
                                                                                                      1⤵
                                                                                                        PID:3408
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2032 -ip 2032
                                                                                                        1⤵
                                                                                                          PID:1684
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 3168 -ip 3168
                                                                                                          1⤵
                                                                                                            PID:3360
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 2560 -ip 2560
                                                                                                            1⤵
                                                                                                              PID:3268
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 4576 -ip 4576
                                                                                                              1⤵
                                                                                                                PID:908
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 1540 -ip 1540
                                                                                                                1⤵
                                                                                                                  PID:4452
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 2780 -ip 2780
                                                                                                                  1⤵
                                                                                                                    PID:2392
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 5004 -ip 5004
                                                                                                                    1⤵
                                                                                                                      PID:4328
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 2820 -ip 2820
                                                                                                                      1⤵
                                                                                                                        PID:2256
                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 2128 -ip 2128
                                                                                                                        1⤵
                                                                                                                          PID:1124
                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 868 -ip 868
                                                                                                                          1⤵
                                                                                                                            PID:1440
                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 384 -ip 384
                                                                                                                            1⤵
                                                                                                                              PID:4724
                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 748 -p 2612 -ip 2612
                                                                                                                              1⤵
                                                                                                                                PID:400

                                                                                                                              Network

                                                                                                                              MITRE ATT&CK Matrix ATT&CK v6

                                                                                                                              Privilege Escalation

                                                                                                                              Bypass User Account Control

                                                                                                                              1
                                                                                                                              T1088

                                                                                                                              Defense Evasion

                                                                                                                              Bypass User Account Control

                                                                                                                              1
                                                                                                                              T1088

                                                                                                                              Disabling Security Tools

                                                                                                                              3
                                                                                                                              T1089

                                                                                                                              Modify Registry

                                                                                                                              4
                                                                                                                              T1112

                                                                                                                              Credential Access

                                                                                                                              Credentials in Files

                                                                                                                              3
                                                                                                                              T1081

                                                                                                                              Discovery

                                                                                                                              Query Registry

                                                                                                                              1
                                                                                                                              T1012

                                                                                                                              System Information Discovery

                                                                                                                              3
                                                                                                                              T1082

                                                                                                                              Collection

                                                                                                                              Data from Local System

                                                                                                                              3
                                                                                                                              T1005

                                                                                                                              Email Collection

                                                                                                                              1
                                                                                                                              T1114

                                                                                                                              Replay Monitor

                                                                                                                              Loading Replay Monitor...

                                                                                                                              Downloads

                                                                                                                              • C:\ProgramData\images.exe
                                                                                                                                Filesize

                                                                                                                                152KB

                                                                                                                                MD5

                                                                                                                                d934bc77b8157ece0a3bbec1527cee9b

                                                                                                                                SHA1

                                                                                                                                841017a8d48040f1e0d593608c2506007ea9f997

                                                                                                                                SHA256

                                                                                                                                c6e161181e3f246471f546f84655f3de28e86860db5c449293a56efc17024aac

                                                                                                                                SHA512

                                                                                                                                5b3bfd6b2f2a7d7a70cd4d40b1fe74b7fc3945dc485f86d46230d19af050d91bc39d68494b9836bf8ebbd3151b3651c753d49d7072e85295e67be8dcc0043fc8

                                                                                                                              • C:\ProgramData\images.exe
                                                                                                                                Filesize

                                                                                                                                152KB

                                                                                                                                MD5

                                                                                                                                d934bc77b8157ece0a3bbec1527cee9b

                                                                                                                                SHA1

                                                                                                                                841017a8d48040f1e0d593608c2506007ea9f997

                                                                                                                                SHA256

                                                                                                                                c6e161181e3f246471f546f84655f3de28e86860db5c449293a56efc17024aac

                                                                                                                                SHA512

                                                                                                                                5b3bfd6b2f2a7d7a70cd4d40b1fe74b7fc3945dc485f86d46230d19af050d91bc39d68494b9836bf8ebbd3151b3651c753d49d7072e85295e67be8dcc0043fc8

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\EGGMM.EXE
                                                                                                                                Filesize

                                                                                                                                126KB

                                                                                                                                MD5

                                                                                                                                350dfc66657d2d9b2231bf8bfe33497b

                                                                                                                                SHA1

                                                                                                                                0fb28b28c416d21f1db2d54355e89fa8ec3e3324

                                                                                                                                SHA256

                                                                                                                                a2bb808321745ce0239b5a84c78a801644d903ce8a6ab87193337aaf2d01fc31

                                                                                                                                SHA512

                                                                                                                                635132ff935ea13048839d2c535d5abbae53c77d332df7c7628dbbb5db94ffc3b5be7820bb116da94433d6c814b5b4b6811bcc32b22cae3adffb086664e010e5

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\EGGMM.EXE
                                                                                                                                Filesize

                                                                                                                                126KB

                                                                                                                                MD5

                                                                                                                                350dfc66657d2d9b2231bf8bfe33497b

                                                                                                                                SHA1

                                                                                                                                0fb28b28c416d21f1db2d54355e89fa8ec3e3324

                                                                                                                                SHA256

                                                                                                                                a2bb808321745ce0239b5a84c78a801644d903ce8a6ab87193337aaf2d01fc31

                                                                                                                                SHA512

                                                                                                                                635132ff935ea13048839d2c535d5abbae53c77d332df7c7628dbbb5db94ffc3b5be7820bb116da94433d6c814b5b4b6811bcc32b22cae3adffb086664e010e5

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\EGGMM.EXE
                                                                                                                                Filesize

                                                                                                                                126KB

                                                                                                                                MD5

                                                                                                                                350dfc66657d2d9b2231bf8bfe33497b

                                                                                                                                SHA1

                                                                                                                                0fb28b28c416d21f1db2d54355e89fa8ec3e3324

                                                                                                                                SHA256

                                                                                                                                a2bb808321745ce0239b5a84c78a801644d903ce8a6ab87193337aaf2d01fc31

                                                                                                                                SHA512

                                                                                                                                635132ff935ea13048839d2c535d5abbae53c77d332df7c7628dbbb5db94ffc3b5be7820bb116da94433d6c814b5b4b6811bcc32b22cae3adffb086664e010e5

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                                                                                                Filesize

                                                                                                                                172KB

                                                                                                                                MD5

                                                                                                                                81912e3dd162ce7c96114a84d0d58b29

                                                                                                                                SHA1

                                                                                                                                2def8b1c48c9e550f57c9dab915c5232a7113d57

                                                                                                                                SHA256

                                                                                                                                f91cf396d6cc0e3803aa25fd0770e9a252196ae616e032e4880668c8ded74dc0

                                                                                                                                SHA512

                                                                                                                                893b3c4483d0a307cad24c73fce27bc4e02438439fc5b07d596146bdb92767e53e60642ff6264ce80891b10c0a7f2a3f5b397560a47ee6e1244d6e5e9a80f341

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\GUM.EXE
                                                                                                                                Filesize

                                                                                                                                172KB

                                                                                                                                MD5

                                                                                                                                81912e3dd162ce7c96114a84d0d58b29

                                                                                                                                SHA1

                                                                                                                                2def8b1c48c9e550f57c9dab915c5232a7113d57

                                                                                                                                SHA256

                                                                                                                                f91cf396d6cc0e3803aa25fd0770e9a252196ae616e032e4880668c8ded74dc0

                                                                                                                                SHA512

                                                                                                                                893b3c4483d0a307cad24c73fce27bc4e02438439fc5b07d596146bdb92767e53e60642ff6264ce80891b10c0a7f2a3f5b397560a47ee6e1244d6e5e9a80f341

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\WALL PAPER.EXE
                                                                                                                                Filesize

                                                                                                                                152KB

                                                                                                                                MD5

                                                                                                                                d934bc77b8157ece0a3bbec1527cee9b

                                                                                                                                SHA1

                                                                                                                                841017a8d48040f1e0d593608c2506007ea9f997

                                                                                                                                SHA256

                                                                                                                                c6e161181e3f246471f546f84655f3de28e86860db5c449293a56efc17024aac

                                                                                                                                SHA512

                                                                                                                                5b3bfd6b2f2a7d7a70cd4d40b1fe74b7fc3945dc485f86d46230d19af050d91bc39d68494b9836bf8ebbd3151b3651c753d49d7072e85295e67be8dcc0043fc8

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\WALL PAPER.EXE
                                                                                                                                Filesize

                                                                                                                                152KB

                                                                                                                                MD5

                                                                                                                                d934bc77b8157ece0a3bbec1527cee9b

                                                                                                                                SHA1

                                                                                                                                841017a8d48040f1e0d593608c2506007ea9f997

                                                                                                                                SHA256

                                                                                                                                c6e161181e3f246471f546f84655f3de28e86860db5c449293a56efc17024aac

                                                                                                                                SHA512

                                                                                                                                5b3bfd6b2f2a7d7a70cd4d40b1fe74b7fc3945dc485f86d46230d19af050d91bc39d68494b9836bf8ebbd3151b3651c753d49d7072e85295e67be8dcc0043fc8

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\WXS.EXE
                                                                                                                                Filesize

                                                                                                                                503KB

                                                                                                                                MD5

                                                                                                                                f801b47ec91f5f75b0f5804506665b14

                                                                                                                                SHA1

                                                                                                                                6ca1c47f85abaed4a3cc414b6200360ca658b2c5

                                                                                                                                SHA256

                                                                                                                                62ae48d339e52a1b5be82e703025f2be10d6025f97fd784d40f2781d6ee886ec

                                                                                                                                SHA512

                                                                                                                                1e3910895b9bbd23d4adf174683f83ce8b000dba606034bfb2bfaa18ffbf2293ebc4eb47bdebda46d2f326f74c963be005ddb440aa2449a21918c40a8d974322

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\WXS.EXE
                                                                                                                                Filesize

                                                                                                                                503KB

                                                                                                                                MD5

                                                                                                                                f801b47ec91f5f75b0f5804506665b14

                                                                                                                                SHA1

                                                                                                                                6ca1c47f85abaed4a3cc414b6200360ca658b2c5

                                                                                                                                SHA256

                                                                                                                                62ae48d339e52a1b5be82e703025f2be10d6025f97fd784d40f2781d6ee886ec

                                                                                                                                SHA512

                                                                                                                                1e3910895b9bbd23d4adf174683f83ce8b000dba606034bfb2bfaa18ffbf2293ebc4eb47bdebda46d2f326f74c963be005ddb440aa2449a21918c40a8d974322

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\freebl3.dll
                                                                                                                                Filesize

                                                                                                                                326KB

                                                                                                                                MD5

                                                                                                                                ef12ab9d0b231b8f898067b2114b1bc0

                                                                                                                                SHA1

                                                                                                                                6d90f27b2105945f9bb77039e8b892070a5f9442

                                                                                                                                SHA256

                                                                                                                                2b00fc4f541ac10c94e3556ff28e30a801811c36422546a546a445aca3f410f7

                                                                                                                                SHA512

                                                                                                                                2aa62bfba556ad8f042942dd25aa071ff6677c257904377c1ec956fd9e862abcbf379e0cfd8c630c303a32ece75618c24e3eef58bddb705c427985b944689193

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\mozglue.dll
                                                                                                                                Filesize

                                                                                                                                133KB

                                                                                                                                MD5

                                                                                                                                75f8cc548cabf0cc800c25047e4d3124

                                                                                                                                SHA1

                                                                                                                                602676768f9faecd35b48c38a0632781dfbde10c

                                                                                                                                SHA256

                                                                                                                                fb419a60305f17359e2ac0510233ee80e845885eee60607715c67dd88e501ef0

                                                                                                                                SHA512

                                                                                                                                ed831c9c769aef3be253c52542cf032afa0a8fa5fe25ca704db65ee6883c608220df7102ac2b99ee9c2e599a0f5db99fd86894a4b169e68440eb1b0d0012672f

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\msvcp140.dll
                                                                                                                                Filesize

                                                                                                                                429KB

                                                                                                                                MD5

                                                                                                                                109f0f02fd37c84bfc7508d4227d7ed5

                                                                                                                                SHA1

                                                                                                                                ef7420141bb15ac334d3964082361a460bfdb975

                                                                                                                                SHA256

                                                                                                                                334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                                                                                                                                SHA512

                                                                                                                                46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\nss3.dll
                                                                                                                                Filesize

                                                                                                                                1.2MB

                                                                                                                                MD5

                                                                                                                                d7858e8449004e21b01d468e9fd04b82

                                                                                                                                SHA1

                                                                                                                                9524352071ede21c167e7e4f106e9526dc23ef4e

                                                                                                                                SHA256

                                                                                                                                78758bf7f3b3b5e3477e38354acd32d787bc1286c8bd9b873471b9c195e638db

                                                                                                                                SHA512

                                                                                                                                1e2c981e6c0ca36c60c6e9cae9548b866d5c524df837095b30d618d9c322def7134c20de820105400dd1b58076b66d90274f67773ac6ba914f611b419babb440

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\softokn3.dll
                                                                                                                                Filesize

                                                                                                                                141KB

                                                                                                                                MD5

                                                                                                                                471c983513694ac3002590345f2be0da

                                                                                                                                SHA1

                                                                                                                                6612b9af4ff6830fa9b7d4193078434ef72f775b

                                                                                                                                SHA256

                                                                                                                                bb3ff746471116c6ad0339fa0522aa2a44a787e33a29c7b27649a054ecd4d00f

                                                                                                                                SHA512

                                                                                                                                a9b0fb923bc3b567e933de10b141a3e9213640e3d790b4c4d753cf220d55593ae8026102909969ba6bfc22da3b2fcd01e30a9f5a74bd14a0fdec9beaf0fb1410

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vcruntime140.dll
                                                                                                                                Filesize

                                                                                                                                81KB

                                                                                                                                MD5

                                                                                                                                7587bf9cb4147022cd5681b015183046

                                                                                                                                SHA1

                                                                                                                                f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                                                                                                                                SHA256

                                                                                                                                c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                                                                                                                                SHA512

                                                                                                                                0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                                                                                                                              • memory/256-144-0x0000000000000000-mapping.dmp
                                                                                                                              • memory/256-162-0x0000000006A50000-0x0000000006C12000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                1.8MB

                                                                                                                              • memory/256-150-0x0000000000E60000-0x0000000000E86000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                152KB

                                                                                                                              • memory/616-137-0x0000000000000000-mapping.dmp
                                                                                                                              • memory/1072-138-0x0000000000000000-mapping.dmp
                                                                                                                              • memory/1124-133-0x0000000007DB0000-0x0000000008354000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                5.6MB

                                                                                                                              • memory/1124-134-0x00000000078E0000-0x0000000007972000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                584KB

                                                                                                                              • memory/1124-135-0x0000000007980000-0x0000000007A1C000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                624KB

                                                                                                                              • memory/1124-136-0x00000000078B0000-0x00000000078BA000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                40KB

                                                                                                                              • memory/1124-132-0x0000000000900000-0x0000000000A3C000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                1.2MB

                                                                                                                              • memory/1140-142-0x0000000000400000-0x00000000004AF000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                700KB

                                                                                                                              • memory/1140-141-0x0000000000400000-0x00000000004AF000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                700KB

                                                                                                                              • memory/1140-139-0x0000000000000000-mapping.dmp
                                                                                                                              • memory/1140-143-0x0000000000400000-0x00000000004AF000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                700KB

                                                                                                                              • memory/1140-151-0x0000000000400000-0x00000000004AF000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                700KB

                                                                                                                              • memory/1140-140-0x0000000000400000-0x00000000004AF000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                700KB

                                                                                                                              • memory/1820-147-0x0000000000000000-mapping.dmp
                                                                                                                              • memory/2876-163-0x0000000000000000-mapping.dmp
                                                                                                                              • memory/3108-157-0x0000000000000000-mapping.dmp
                                                                                                                              • memory/3152-168-0x0000000000000000-mapping.dmp
                                                                                                                              • memory/3152-169-0x0000000001400000-0x0000000001401000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/3764-171-0x00000000040B0000-0x0000000004134000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                528KB

                                                                                                                              • memory/3764-170-0x0000000003BB0000-0x0000000003D50000-memory.dmp
                                                                                                                                Filesize

                                                                                                                                1.6MB

                                                                                                                              • memory/3764-164-0x0000000000000000-mapping.dmp
                                                                                                                              • memory/3932-167-0x0000000000000000-mapping.dmp
                                                                                                                              • memory/4488-152-0x0000000000000000-mapping.dmp
                                                                                                                              • memory/5048-154-0x0000000000000000-mapping.dmp