Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2022, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
271KB
-
MD5
0b28c768b2688d0b845c6cc8fd1c0c0d
-
SHA1
9c90b3b6675075e7e36199f9ece3fd4d8231b810
-
SHA256
66d05cd109af6833d21e53732782d29a1b4f2f24b4431fc65c3c39da708e6c59
-
SHA512
4d6d255afa82b82a903f5d40c31c286ae8f8945d01a255657e8ce00e523418138ef4c47d3a4d6e5b76812fd5d80efd1afea622972eb424972852a92c54229d11
-
SSDEEP
6144:IMa2WyLuVFvsvx3mzUNRRuzbgwu+JrtjfwVfUsk:IMLqF0Z3mzUunn7B3
Malware Config
Extracted
djvu
http://winnlinne.com/lancer/get.php
-
extension
.adww
-
offline_id
z8lhl4oForVEc7gy9Ra8rSqjYMl3xiFRuIW4not1
-
payload_url
http://rgyui.top/dl/build2.exe
http://winnlinne.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-g28rVcqA58 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0573Jhyjd
Extracted
vidar
54.9
517
https://t.me/larsenup
https://ioc.exchange/@zebra54
-
profile_id
517
Signatures
-
Detected Djvu ransomware 10 IoCs
resource yara_rule behavioral2/memory/4556-151-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4556-153-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/228-156-0x00000000021A0000-0x00000000022BB000-memory.dmp family_djvu behavioral2/memory/4556-155-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4556-158-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4556-179-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4496-188-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4496-190-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4496-195-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4496-232-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral2/memory/5000-133-0x0000000000460000-0x0000000000469000-memory.dmp family_smokeloader behavioral2/memory/4216-166-0x0000000000480000-0x0000000000489000-memory.dmp family_smokeloader behavioral2/memory/4464-253-0x0000000000E60000-0x0000000000E65000-memory.dmp family_smokeloader behavioral2/memory/3636-256-0x00000000007B0000-0x00000000007B6000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
pid Process 228 BEF0.exe 3532 C4EC.exe 4216 C78D.exe 4556 BEF0.exe 2336 BEF0.exe 4496 BEF0.exe 2828 build2.exe 404 build3.exe 2104 build2.exe 3528 mstsca.exe 4236 51CD.exe 4924 5837.exe 4748 65F4.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation BEF0.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation BEF0.exe -
Loads dropped DLL 3 IoCs
pid Process 4228 regsvr32.exe 2104 build2.exe 2104 build2.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1484 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\ad135e8f-d957-4f09-8008-2c8717d23786\\BEF0.exe\" --AutoStart" BEF0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 api.2ip.ua 19 api.2ip.ua 39 api.2ip.ua -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 228 set thread context of 4556 228 BEF0.exe 95 PID 2336 set thread context of 4496 2336 BEF0.exe 126 PID 2828 set thread context of 2104 2828 build2.exe 133 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 2872 3532 WerFault.exe 91 1236 3532 WerFault.exe 91 2760 3532 WerFault.exe 91 3736 3532 WerFault.exe 91 2588 3532 WerFault.exe 91 4820 3532 WerFault.exe 91 4540 3532 WerFault.exe 91 4740 3532 WerFault.exe 91 3928 3532 WerFault.exe 91 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C78D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C78D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C78D.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 224 schtasks.exe 3012 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5000 file.exe 5000 file.exe 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 740 Process not Found -
Suspicious behavior: MapViewOfSection 24 IoCs
pid Process 5000 file.exe 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 4216 C78D.exe 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 740 Process not Found Token: SeCreatePagefilePrivilege 740 Process not Found Token: SeShutdownPrivilege 740 Process not Found Token: SeCreatePagefilePrivilege 740 Process not Found Token: SeShutdownPrivilege 740 Process not Found Token: SeCreatePagefilePrivilege 740 Process not Found Token: SeShutdownPrivilege 740 Process not Found Token: SeCreatePagefilePrivilege 740 Process not Found Token: SeShutdownPrivilege 740 Process not Found Token: SeCreatePagefilePrivilege 740 Process not Found Token: SeShutdownPrivilege 740 Process not Found Token: SeCreatePagefilePrivilege 740 Process not Found Token: SeShutdownPrivilege 740 Process not Found Token: SeCreatePagefilePrivilege 740 Process not Found Token: SeShutdownPrivilege 740 Process not Found Token: SeCreatePagefilePrivilege 740 Process not Found Token: SeIncreaseQuotaPrivilege 888 wmic.exe Token: SeSecurityPrivilege 888 wmic.exe Token: SeTakeOwnershipPrivilege 888 wmic.exe Token: SeLoadDriverPrivilege 888 wmic.exe Token: SeSystemProfilePrivilege 888 wmic.exe Token: SeSystemtimePrivilege 888 wmic.exe Token: SeProfSingleProcessPrivilege 888 wmic.exe Token: SeIncBasePriorityPrivilege 888 wmic.exe Token: SeCreatePagefilePrivilege 888 wmic.exe Token: SeBackupPrivilege 888 wmic.exe Token: SeRestorePrivilege 888 wmic.exe Token: SeShutdownPrivilege 888 wmic.exe Token: SeDebugPrivilege 888 wmic.exe Token: SeSystemEnvironmentPrivilege 888 wmic.exe Token: SeRemoteShutdownPrivilege 888 wmic.exe Token: SeUndockPrivilege 888 wmic.exe Token: SeManageVolumePrivilege 888 wmic.exe Token: 33 888 wmic.exe Token: 34 888 wmic.exe Token: 35 888 wmic.exe Token: 36 888 wmic.exe Token: SeShutdownPrivilege 740 Process not Found Token: SeCreatePagefilePrivilege 740 Process not Found Token: SeIncreaseQuotaPrivilege 888 wmic.exe Token: SeSecurityPrivilege 888 wmic.exe Token: SeTakeOwnershipPrivilege 888 wmic.exe Token: SeLoadDriverPrivilege 888 wmic.exe Token: SeSystemProfilePrivilege 888 wmic.exe Token: SeSystemtimePrivilege 888 wmic.exe Token: SeProfSingleProcessPrivilege 888 wmic.exe Token: SeIncBasePriorityPrivilege 888 wmic.exe Token: SeCreatePagefilePrivilege 888 wmic.exe Token: SeBackupPrivilege 888 wmic.exe Token: SeRestorePrivilege 888 wmic.exe Token: SeShutdownPrivilege 888 wmic.exe Token: SeDebugPrivilege 888 wmic.exe Token: SeSystemEnvironmentPrivilege 888 wmic.exe Token: SeRemoteShutdownPrivilege 888 wmic.exe Token: SeUndockPrivilege 888 wmic.exe Token: SeManageVolumePrivilege 888 wmic.exe Token: 33 888 wmic.exe Token: 34 888 wmic.exe Token: 35 888 wmic.exe Token: 36 888 wmic.exe Token: SeShutdownPrivilege 740 Process not Found Token: SeCreatePagefilePrivilege 740 Process not Found Token: SeIncreaseQuotaPrivilege 3700 WMIC.exe Token: SeSecurityPrivilege 3700 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 740 wrote to memory of 228 740 Process not Found 90 PID 740 wrote to memory of 228 740 Process not Found 90 PID 740 wrote to memory of 228 740 Process not Found 90 PID 740 wrote to memory of 3532 740 Process not Found 91 PID 740 wrote to memory of 3532 740 Process not Found 91 PID 740 wrote to memory of 3532 740 Process not Found 91 PID 740 wrote to memory of 4216 740 Process not Found 92 PID 740 wrote to memory of 4216 740 Process not Found 92 PID 740 wrote to memory of 4216 740 Process not Found 92 PID 740 wrote to memory of 2044 740 Process not Found 93 PID 740 wrote to memory of 2044 740 Process not Found 93 PID 2044 wrote to memory of 4228 2044 regsvr32.exe 94 PID 2044 wrote to memory of 4228 2044 regsvr32.exe 94 PID 2044 wrote to memory of 4228 2044 regsvr32.exe 94 PID 228 wrote to memory of 4556 228 BEF0.exe 95 PID 228 wrote to memory of 4556 228 BEF0.exe 95 PID 228 wrote to memory of 4556 228 BEF0.exe 95 PID 740 wrote to memory of 3140 740 Process not Found 96 PID 740 wrote to memory of 3140 740 Process not Found 96 PID 740 wrote to memory of 3140 740 Process not Found 96 PID 740 wrote to memory of 3140 740 Process not Found 96 PID 228 wrote to memory of 4556 228 BEF0.exe 95 PID 228 wrote to memory of 4556 228 BEF0.exe 95 PID 228 wrote to memory of 4556 228 BEF0.exe 95 PID 228 wrote to memory of 4556 228 BEF0.exe 95 PID 228 wrote to memory of 4556 228 BEF0.exe 95 PID 228 wrote to memory of 4556 228 BEF0.exe 95 PID 228 wrote to memory of 4556 228 BEF0.exe 95 PID 740 wrote to memory of 528 740 Process not Found 97 PID 740 wrote to memory of 528 740 Process not Found 97 PID 740 wrote to memory of 528 740 Process not Found 97 PID 4556 wrote to memory of 1484 4556 BEF0.exe 99 PID 4556 wrote to memory of 1484 4556 BEF0.exe 99 PID 4556 wrote to memory of 1484 4556 BEF0.exe 99 PID 4556 wrote to memory of 2336 4556 BEF0.exe 106 PID 4556 wrote to memory of 2336 4556 BEF0.exe 106 PID 4556 wrote to memory of 2336 4556 BEF0.exe 106 PID 3532 wrote to memory of 888 3532 C4EC.exe 114 PID 3532 wrote to memory of 888 3532 C4EC.exe 114 PID 3532 wrote to memory of 888 3532 C4EC.exe 114 PID 3532 wrote to memory of 4788 3532 C4EC.exe 120 PID 3532 wrote to memory of 4788 3532 C4EC.exe 120 PID 3532 wrote to memory of 4788 3532 C4EC.exe 120 PID 4788 wrote to memory of 3700 4788 cmd.exe 122 PID 4788 wrote to memory of 3700 4788 cmd.exe 122 PID 4788 wrote to memory of 3700 4788 cmd.exe 122 PID 3532 wrote to memory of 1748 3532 C4EC.exe 123 PID 3532 wrote to memory of 1748 3532 C4EC.exe 123 PID 3532 wrote to memory of 1748 3532 C4EC.exe 123 PID 1748 wrote to memory of 2332 1748 cmd.exe 125 PID 1748 wrote to memory of 2332 1748 cmd.exe 125 PID 1748 wrote to memory of 2332 1748 cmd.exe 125 PID 2336 wrote to memory of 4496 2336 BEF0.exe 126 PID 2336 wrote to memory of 4496 2336 BEF0.exe 126 PID 2336 wrote to memory of 4496 2336 BEF0.exe 126 PID 2336 wrote to memory of 4496 2336 BEF0.exe 126 PID 2336 wrote to memory of 4496 2336 BEF0.exe 126 PID 2336 wrote to memory of 4496 2336 BEF0.exe 126 PID 2336 wrote to memory of 4496 2336 BEF0.exe 126 PID 2336 wrote to memory of 4496 2336 BEF0.exe 126 PID 2336 wrote to memory of 4496 2336 BEF0.exe 126 PID 2336 wrote to memory of 4496 2336 BEF0.exe 126 PID 4496 wrote to memory of 2828 4496 BEF0.exe 129 PID 4496 wrote to memory of 2828 4496 BEF0.exe 129 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5000
-
C:\Users\Admin\AppData\Local\Temp\BEF0.exeC:\Users\Admin\AppData\Local\Temp\BEF0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\BEF0.exeC:\Users\Admin\AppData\Local\Temp\BEF0.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\ad135e8f-d957-4f09-8008-2c8717d23786" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\BEF0.exe"C:\Users\Admin\AppData\Local\Temp\BEF0.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\BEF0.exe"C:\Users\Admin\AppData\Local\Temp\BEF0.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\9258d1e7-1105-4ed2-8c94-c1ebfe760582\build2.exe"C:\Users\Admin\AppData\Local\9258d1e7-1105-4ed2-8c94-c1ebfe760582\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2828 -
C:\Users\Admin\AppData\Local\9258d1e7-1105-4ed2-8c94-c1ebfe760582\build2.exe"C:\Users\Admin\AppData\Local\9258d1e7-1105-4ed2-8c94-c1ebfe760582\build2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:2104
-
-
-
C:\Users\Admin\AppData\Local\9258d1e7-1105-4ed2-8c94-c1ebfe760582\build3.exe"C:\Users\Admin\AppData\Local\9258d1e7-1105-4ed2-8c94-c1ebfe760582\build3.exe"5⤵
- Executes dropped EXE
PID:404 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- Creates scheduled task(s)
PID:3012
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\C4EC.exeC:\Users\Admin\AppData\Local\Temp\C4EC.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 5362⤵
- Program crash
PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 5362⤵
- Program crash
PID:1236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 5482⤵
- Program crash
PID:2760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 6562⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 7602⤵
- Program crash
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 8602⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 13642⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 13682⤵
- Program crash
PID:4740
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:2332
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 1402⤵
- Program crash
PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\C78D.exeC:\Users\Admin\AppData\Local\Temp\C78D.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4216
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\CA0E.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\CA0E.dll2⤵
- Loads dropped DLL
PID:4228
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3140
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3532 -ip 35321⤵PID:2956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3532 -ip 35321⤵PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3532 -ip 35321⤵PID:924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3532 -ip 35321⤵PID:3252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3532 -ip 35321⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3532 -ip 35321⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3532 -ip 35321⤵PID:1872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3532 -ip 35321⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3532 -ip 35321⤵PID:764
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:3528 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\51CD.exeC:\Users\Admin\AppData\Local\Temp\51CD.exe1⤵
- Executes dropped EXE
PID:4236
-
C:\Users\Admin\AppData\Local\Temp\5837.exeC:\Users\Admin\AppData\Local\Temp\5837.exe1⤵
- Executes dropped EXE
PID:4924
-
C:\Users\Admin\AppData\Local\Temp\65F4.exeC:\Users\Admin\AppData\Local\Temp\65F4.exe1⤵
- Executes dropped EXE
PID:4748
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4672
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2196
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4464
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3636
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3820
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2252
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2516
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1620
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1552
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5596d2fdcebb9285d08c83e8c66f21dc9
SHA1d634a64d292467c4fe9f1b2b80ac3bf82a08d49f
SHA2560231bc4602667ff24bfa1caab1d56c225a54031c452c9de84b810be18628a3e3
SHA512fd0399c36455095561381c33ba0f6f98496dc2fd63792f148ec9dfbc06ed6ad24a6bf9aa7f559dba7f257ccd145ee8532418606c2eb282a42ca678de4231d818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5b6f52795b677b4e2ad47736ffe3704a5
SHA1945cb962aae5a0986c476650006227debf93b51c
SHA256c8aff1f15506340e6abd76c8a8382e9caeba4fa8e8483254cf7ab9d22c2a57fe
SHA5121e241b4c9bf53a97c980dd09bc73abcaf05ed8ccc641d5b0ad1eadc4502b4c1519b62d9c51f8e38c73898c2eca4a4a2e81777763731bf0f36dc5c04a30ae0450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD564acd3bed39cc32cd9ce59720af6536c
SHA1c5c3629631862d362872579e3ab7be80b42234e9
SHA256420238384bc8ead9447dece6efaebc4afedcead467dc89464e5ce5b51c6d6cc7
SHA51256a098b8f85cc2726189090ae2326d7f76c93a245e0cf1f71803566ebf7ce4f0ba3706e957f29494b2be52446261d778fc56b099e35976cfc2c944663d3b69bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5aae32f9afdbfd4ea8de07897742e1e1f
SHA154fc176023bace216a14b09201c7ce842dce2c1e
SHA25604ce80ff9904cfc7a0abb060b4caa2bab5fe091f7b08bd52f816f9e5d72827a6
SHA512269222a20b350ecf79f75c9a314f23b5950f636d5cf2d1b3464663c68e1c3ca5ec95a8ad57f290abc60c6ae1576873d099076158c7024caf3e0670f183e75e28
-
Filesize
255KB
MD59c3d4324a153c6438f48083bc333a962
SHA1033e80e2008f4f62d2716ce0473bb0d763d52277
SHA2565ee57d85a41b825060864ae85981253f28148d15586a5f6274d562dfeae93e98
SHA5128cce276e59b2fcdb333fecaaa1e3ab9d0b24e25c54a6fc959b6c190441061fab67ea0d35e7077cf910b557b6a60b90c1d2260352b11789bbcd430814fcff51cd
-
Filesize
255KB
MD59c3d4324a153c6438f48083bc333a962
SHA1033e80e2008f4f62d2716ce0473bb0d763d52277
SHA2565ee57d85a41b825060864ae85981253f28148d15586a5f6274d562dfeae93e98
SHA5128cce276e59b2fcdb333fecaaa1e3ab9d0b24e25c54a6fc959b6c190441061fab67ea0d35e7077cf910b557b6a60b90c1d2260352b11789bbcd430814fcff51cd
-
Filesize
255KB
MD59c3d4324a153c6438f48083bc333a962
SHA1033e80e2008f4f62d2716ce0473bb0d763d52277
SHA2565ee57d85a41b825060864ae85981253f28148d15586a5f6274d562dfeae93e98
SHA5128cce276e59b2fcdb333fecaaa1e3ab9d0b24e25c54a6fc959b6c190441061fab67ea0d35e7077cf910b557b6a60b90c1d2260352b11789bbcd430814fcff51cd
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
316KB
MD50d1ffd14ba618ad35c9a30229452378c
SHA154ae25705637847751cd8f5924cce5e75847dab1
SHA256a896b5a6415c2faffdd5a1a77bd62a6c660629b9776ab0475b6d01f60eda1479
SHA512157d8466f0d2c0d4d7f0bff88fdbeafeb5af1801a2c871bbed25fb0680e2eb81fb223e4867e6e6936eb03e2cb1ef88b2e15b1f381341bb3fc4a1d864b8fd662b
-
Filesize
316KB
MD50d1ffd14ba618ad35c9a30229452378c
SHA154ae25705637847751cd8f5924cce5e75847dab1
SHA256a896b5a6415c2faffdd5a1a77bd62a6c660629b9776ab0475b6d01f60eda1479
SHA512157d8466f0d2c0d4d7f0bff88fdbeafeb5af1801a2c871bbed25fb0680e2eb81fb223e4867e6e6936eb03e2cb1ef88b2e15b1f381341bb3fc4a1d864b8fd662b
-
Filesize
363KB
MD5ce404285413523eb7fcb0b8e452659c3
SHA1a4f55d1eb64c4a9da284e7c214eb155fc50cfe5c
SHA2565b698dfd9cc6863c59ceec45ecbcc8c7024099eecf5ee7e640841d4c46afaf46
SHA51228a495764e28915a9da7bf78e50d52383d9d041c7e9383de8ddd6a99e1cb99f85711daa15f5f084f88403da1055a7a24fd39f45f0879cd740737b4228cac28ad
-
Filesize
363KB
MD5ce404285413523eb7fcb0b8e452659c3
SHA1a4f55d1eb64c4a9da284e7c214eb155fc50cfe5c
SHA2565b698dfd9cc6863c59ceec45ecbcc8c7024099eecf5ee7e640841d4c46afaf46
SHA51228a495764e28915a9da7bf78e50d52383d9d041c7e9383de8ddd6a99e1cb99f85711daa15f5f084f88403da1055a7a24fd39f45f0879cd740737b4228cac28ad
-
Filesize
363KB
MD5ad170ecbf3579649162c3cb67d398672
SHA1838306ef60ae4286030be9b395c866abd0c8ff47
SHA2565e924125ff6aeb76684f4fb7f578c6d9278b243ed18e9a9eff8b2b28045ec5a5
SHA51283a5511b668f49d4361a4a9dd5c8944c6395504f8f31c3a0ab94a9ea1d75d4b17c72c433c53d73cd9dfbb641c34b2741ef15474bacc7c6728e889511ffafc185
-
Filesize
363KB
MD5ad170ecbf3579649162c3cb67d398672
SHA1838306ef60ae4286030be9b395c866abd0c8ff47
SHA2565e924125ff6aeb76684f4fb7f578c6d9278b243ed18e9a9eff8b2b28045ec5a5
SHA51283a5511b668f49d4361a4a9dd5c8944c6395504f8f31c3a0ab94a9ea1d75d4b17c72c433c53d73cd9dfbb641c34b2741ef15474bacc7c6728e889511ffafc185
-
Filesize
791KB
MD5b8e31e6ad8d3e923f655411ee61abefb
SHA19c6aaff5306ba5f936e3ee02e312ae5ad31dd6b9
SHA2568d8265d898414ce6bced72b8a8827df4f6cad737091e56e596157ce648cb30f7
SHA512f148c0826dca4e4262dac718ba2191682f599e93968e0ff4e2b826c2adfaa25500e6feb88d6cb41d61aa115f352d783de5551f872a6547dca17694d096fa1cd2
-
Filesize
791KB
MD5b8e31e6ad8d3e923f655411ee61abefb
SHA19c6aaff5306ba5f936e3ee02e312ae5ad31dd6b9
SHA2568d8265d898414ce6bced72b8a8827df4f6cad737091e56e596157ce648cb30f7
SHA512f148c0826dca4e4262dac718ba2191682f599e93968e0ff4e2b826c2adfaa25500e6feb88d6cb41d61aa115f352d783de5551f872a6547dca17694d096fa1cd2
-
Filesize
791KB
MD5b8e31e6ad8d3e923f655411ee61abefb
SHA19c6aaff5306ba5f936e3ee02e312ae5ad31dd6b9
SHA2568d8265d898414ce6bced72b8a8827df4f6cad737091e56e596157ce648cb30f7
SHA512f148c0826dca4e4262dac718ba2191682f599e93968e0ff4e2b826c2adfaa25500e6feb88d6cb41d61aa115f352d783de5551f872a6547dca17694d096fa1cd2
-
Filesize
791KB
MD5b8e31e6ad8d3e923f655411ee61abefb
SHA19c6aaff5306ba5f936e3ee02e312ae5ad31dd6b9
SHA2568d8265d898414ce6bced72b8a8827df4f6cad737091e56e596157ce648cb30f7
SHA512f148c0826dca4e4262dac718ba2191682f599e93968e0ff4e2b826c2adfaa25500e6feb88d6cb41d61aa115f352d783de5551f872a6547dca17694d096fa1cd2
-
Filesize
791KB
MD5b8e31e6ad8d3e923f655411ee61abefb
SHA19c6aaff5306ba5f936e3ee02e312ae5ad31dd6b9
SHA2568d8265d898414ce6bced72b8a8827df4f6cad737091e56e596157ce648cb30f7
SHA512f148c0826dca4e4262dac718ba2191682f599e93968e0ff4e2b826c2adfaa25500e6feb88d6cb41d61aa115f352d783de5551f872a6547dca17694d096fa1cd2
-
Filesize
4.7MB
MD5b75490a7e9348c6d98c5cf62b94f85a0
SHA1971e659eeebc978ed9b45381807b4635ca08cbf7
SHA256007400d86d6f27c3b62b01404cd0bcfa61843580039c7c6a4888e0dff25ddcae
SHA5125568403f9a425d48d8f47eee3cab37705572de1178855d43e6cc324047c05809b2c102b3e4d54cd6acc08a22ec4f0fbd634d549e83568f5fee3ba65ec43a6200
-
Filesize
4.7MB
MD5b75490a7e9348c6d98c5cf62b94f85a0
SHA1971e659eeebc978ed9b45381807b4635ca08cbf7
SHA256007400d86d6f27c3b62b01404cd0bcfa61843580039c7c6a4888e0dff25ddcae
SHA5125568403f9a425d48d8f47eee3cab37705572de1178855d43e6cc324047c05809b2c102b3e4d54cd6acc08a22ec4f0fbd634d549e83568f5fee3ba65ec43a6200
-
Filesize
272KB
MD5df6289ebc7374f7a002bfc9af23eb0f4
SHA1dc054153917c246b3a33f8bfb6b2c8e9c31e0166
SHA2560aae81097ced637ea1154e678d97e240c383ecba268d215146032e35154723c9
SHA5129e81503298744eae0c3c8f36338647d71f94592daf13175df43d44177fbb680e70595fbefdb37f2b23dbe96dad6e6ca909ac3f2bcfd8f5e1772f60ba7b8dadd8
-
Filesize
272KB
MD5df6289ebc7374f7a002bfc9af23eb0f4
SHA1dc054153917c246b3a33f8bfb6b2c8e9c31e0166
SHA2560aae81097ced637ea1154e678d97e240c383ecba268d215146032e35154723c9
SHA5129e81503298744eae0c3c8f36338647d71f94592daf13175df43d44177fbb680e70595fbefdb37f2b23dbe96dad6e6ca909ac3f2bcfd8f5e1772f60ba7b8dadd8
-
Filesize
2.0MB
MD59d92c298bce081adbc27970066117179
SHA16edbb822af723e4dbe7905ef569d510d0baf4491
SHA2567ea496fa0b759993e1dcb0a359a3cd94e07ee3782bf259ba50ea12a1abb16af3
SHA5129f1fa84f683af8b98225c9ff0044c4d85dbab8a19b0ae402a4214fa1b98c101e076111f7fb87d0e76000c9f3ac18e986544d1cae0d4331521bfdf9b34bbf5c2e
-
Filesize
2.0MB
MD59d92c298bce081adbc27970066117179
SHA16edbb822af723e4dbe7905ef569d510d0baf4491
SHA2567ea496fa0b759993e1dcb0a359a3cd94e07ee3782bf259ba50ea12a1abb16af3
SHA5129f1fa84f683af8b98225c9ff0044c4d85dbab8a19b0ae402a4214fa1b98c101e076111f7fb87d0e76000c9f3ac18e986544d1cae0d4331521bfdf9b34bbf5c2e
-
Filesize
791KB
MD5b8e31e6ad8d3e923f655411ee61abefb
SHA19c6aaff5306ba5f936e3ee02e312ae5ad31dd6b9
SHA2568d8265d898414ce6bced72b8a8827df4f6cad737091e56e596157ce648cb30f7
SHA512f148c0826dca4e4262dac718ba2191682f599e93968e0ff4e2b826c2adfaa25500e6feb88d6cb41d61aa115f352d783de5551f872a6547dca17694d096fa1cd2
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a