Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 14:00
Static task
static1
General
-
Target
63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe
-
Size
1.3MB
-
MD5
66eea88b2c9e24cd13f4c86e41b3e6a0
-
SHA1
b2380bb40efcb87076b5ddbad91ff5c695a1806e
-
SHA256
63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a
-
SHA512
0945760ccf58ba23db5d0b34c903ccf7dac2f14dc56e0fff993035a6d3c8f2a21f8a3c555a3ed1cfd6730f0c366696d0fc18923af47d5b3f57e0c48e49247029
-
SSDEEP
24576:LcxerY1UZBGvD/oDIU4Bu70CMP9ie7HxIGwZxCOiOaUIdCZ9lthKR/S:LccmvDNUIurMEe7H6GwWyIoeR/S
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 4084 rundll32.exe 4 4084 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 6 IoCs
pid pid_target Process procid_target 1504 2188 WerFault.exe 77 5056 2188 WerFault.exe 77 3464 2188 WerFault.exe 77 2896 2188 WerFault.exe 77 2820 2188 WerFault.exe 77 2288 2188 WerFault.exe 77 -
Checks SCSI registry key(s) 3 TTPs 36 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe -
Checks processor information in registry 2 TTPs 19 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 4956 svchost.exe Token: SeShutdownPrivilege 4956 svchost.exe Token: SeCreatePagefilePrivilege 4956 svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3700 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 78 PID 2188 wrote to memory of 3700 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 78 PID 2188 wrote to memory of 3700 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 78 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84 PID 2188 wrote to memory of 4084 2188 63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe"C:\Users\Admin\AppData\Local\Temp\63a1f40c0b381d1b483445822dc2f6a6413a17d58a84f185621b50b54ee8732a.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\agentactivationruntimestarter.exeC:\Windows\system32\agentactivationruntimestarter.exe2⤵PID:3700
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 6282⤵
- Program crash
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 8722⤵
- Program crash
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 9082⤵
- Program crash
PID:3464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 10122⤵
- Program crash
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 10322⤵
- Program crash
PID:2820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 10442⤵
- Program crash
PID:2288
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4e4 0x4301⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2188 -ip 21881⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2188 -ip 21881⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2188 -ip 21881⤵PID:2544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2188 -ip 21881⤵PID:3404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2188 -ip 21881⤵PID:1356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2188 -ip 21881⤵PID:3144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD58b9c0f72deaf2ee06e7441209cbe4ffb
SHA134912f3c7f4285d85497c96e95c33e5d6a597c97
SHA2561e7242ac7c025b87636e59c07e3601f1bbf5894ce0b23709405b6fefbca4dabe
SHA512db8fb980b6331f494fea8dd4adf6d8724c9ad1a7a2048c6d91e49d9e81fc83700c1195854efc5dcbe2b3aef8d94b5f0ddd7ae8910f40b9cdab017e381f855cd7