Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 20:56
Behavioral task
behavioral1
Sample
94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe
Resource
win10v2004-20220901-en
General
-
Target
94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe
-
Size
1.0MB
-
MD5
ea152391202b4fcef52ec714ae5684bb
-
SHA1
0646192dd09e55ab2958fb753fc801d1ff293dcc
-
SHA256
94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04
-
SHA512
0940fb9e270d180d5b1b68b7db15425d20ba314a41da7042b07008312fa98ffbce21c78ca677b22eaea2e4b7b1b58fe9d38aa1483a93ef00cce1f5d9d3d83048
-
SSDEEP
24576:0cNJP38kXIxRkm0BCRLo50WD15X8ezAMPZWWPItL9wuWm7I1vq53b2:0cTPMkMRp5ORnXyG8tLPWm7aq53b2
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/4956-134-0x0000000000400000-0x0000000000514000-memory.dmp modiloader_stage2 behavioral2/memory/4956-138-0x0000000000400000-0x0000000000514000-memory.dmp modiloader_stage2 behavioral2/memory/1560-145-0x0000000000400000-0x0000000000514000-memory.dmp modiloader_stage2 behavioral2/memory/1560-146-0x0000000000400000-0x0000000000514000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1560 mstwain32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Wine 94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Wine mstwain32.exe -
Loads dropped DLL 4 IoCs
pid Process 1560 mstwain32.exe 1560 mstwain32.exe 1560 mstwain32.exe 1560 mstwain32.exe -
resource yara_rule behavioral2/memory/4956-132-0x0000000000400000-0x0000000000514000-memory.dmp themida behavioral2/memory/4956-133-0x0000000000400000-0x0000000000514000-memory.dmp themida behavioral2/memory/4956-134-0x0000000000400000-0x0000000000514000-memory.dmp themida behavioral2/files/0x000500000001e470-136.dat themida behavioral2/files/0x000500000001e470-137.dat themida behavioral2/memory/4956-138-0x0000000000400000-0x0000000000514000-memory.dmp themida behavioral2/memory/1560-139-0x0000000000400000-0x0000000000514000-memory.dmp themida behavioral2/memory/1560-145-0x0000000000400000-0x0000000000514000-memory.dmp themida behavioral2/memory/1560-146-0x0000000000400000-0x0000000000514000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4956 94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe 1560 mstwain32.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\mstwain32.exe 94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe File opened for modification C:\Windows\mstwain32.exe 94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 50 IoCs
pid pid_target Process procid_target 624 4956 WerFault.exe 79 1768 4956 WerFault.exe 79 3208 4956 WerFault.exe 79 3724 4956 WerFault.exe 79 424 4956 WerFault.exe 79 1060 4956 WerFault.exe 79 100 4956 WerFault.exe 79 1152 4956 WerFault.exe 79 4788 4956 WerFault.exe 79 3796 4956 WerFault.exe 79 2860 4956 WerFault.exe 79 4072 4956 WerFault.exe 79 1380 4956 WerFault.exe 79 4088 4956 WerFault.exe 79 4512 4956 WerFault.exe 79 928 4956 WerFault.exe 79 4136 4956 WerFault.exe 79 4556 4956 WerFault.exe 79 4784 4956 WerFault.exe 79 1292 4956 WerFault.exe 79 4696 4956 WerFault.exe 79 5092 4956 WerFault.exe 79 4288 4956 WerFault.exe 79 4076 4956 WerFault.exe 79 448 4956 WerFault.exe 79 2732 1560 WerFault.exe 134 4576 1560 WerFault.exe 134 312 1560 WerFault.exe 134 2792 1560 WerFault.exe 134 1644 1560 WerFault.exe 134 4244 1560 WerFault.exe 134 3312 1560 WerFault.exe 134 4768 1560 WerFault.exe 134 4348 1560 WerFault.exe 134 3440 1560 WerFault.exe 134 3884 1560 WerFault.exe 134 2872 1560 WerFault.exe 134 4012 1560 WerFault.exe 134 4048 1560 WerFault.exe 134 3480 1560 WerFault.exe 134 2448 1560 WerFault.exe 134 824 1560 WerFault.exe 134 4232 1560 WerFault.exe 134 3000 1560 WerFault.exe 134 3376 1560 WerFault.exe 134 4540 1560 WerFault.exe 134 652 1560 WerFault.exe 134 3832 1560 WerFault.exe 134 852 1560 WerFault.exe 134 1888 1560 WerFault.exe 134 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4956 94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe 4956 94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe 1560 mstwain32.exe 1560 mstwain32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4956 94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe Token: SeBackupPrivilege 2404 vssvc.exe Token: SeRestorePrivilege 2404 vssvc.exe Token: SeAuditPrivilege 2404 vssvc.exe Token: SeDebugPrivilege 1560 mstwain32.exe Token: SeDebugPrivilege 1560 mstwain32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1560 mstwain32.exe 1560 mstwain32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4956 wrote to memory of 1560 4956 94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe 134 PID 4956 wrote to memory of 1560 4956 94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe 134 PID 4956 wrote to memory of 1560 4956 94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe 134 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe"C:\Users\Admin\AppData\Local\Temp\94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe"1⤵
- Checks computer location settings
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 2802⤵
- Program crash
PID:624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 3362⤵
- Program crash
PID:1768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 3442⤵
- Program crash
PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5042⤵
- Program crash
PID:3724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5082⤵
- Program crash
PID:424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5362⤵
- Program crash
PID:1060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5562⤵
- Program crash
PID:100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5442⤵
- Program crash
PID:1152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5682⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 6082⤵
- Program crash
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5762⤵
- Program crash
PID:2860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 6162⤵
- Program crash
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5682⤵
- Program crash
PID:1380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 6522⤵
- Program crash
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 6602⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 6402⤵
- Program crash
PID:928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 6682⤵
- Program crash
PID:4136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5842⤵
- Program crash
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5682⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5922⤵
- Program crash
PID:1292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5882⤵
- Program crash
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 3482⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5962⤵
- Program crash
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5162⤵
- Program crash
PID:4076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 5522⤵
- Program crash
PID:448
-
-
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\94d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 2763⤵
- Program crash
PID:2732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 3323⤵
- Program crash
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 4883⤵
- Program crash
PID:312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5083⤵
- Program crash
PID:2792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5163⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 4843⤵
- Program crash
PID:4244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 4963⤵
- Program crash
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 4923⤵
- Program crash
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5003⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5283⤵
- Program crash
PID:3440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 2963⤵
- Program crash
PID:3884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 3443⤵
- Program crash
PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5043⤵
- Program crash
PID:4012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5003⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 3483⤵
- Program crash
PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5123⤵
- Program crash
PID:2448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5243⤵
- Program crash
PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5003⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5203⤵
- Program crash
PID:3000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 4963⤵
- Program crash
PID:3376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 3403⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5123⤵
- Program crash
PID:652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 4923⤵
- Program crash
PID:3832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 3443⤵
- Program crash
PID:852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5163⤵
- Program crash
PID:1888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4956 -ip 49561⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4956 -ip 49561⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4956 -ip 49561⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4956 -ip 49561⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4956 -ip 49561⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4956 -ip 49561⤵PID:3372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4956 -ip 49561⤵PID:460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4956 -ip 49561⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4956 -ip 49561⤵PID:4080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4956 -ip 49561⤵PID:4328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4956 -ip 49561⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4956 -ip 49561⤵PID:440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4956 -ip 49561⤵PID:1272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4956 -ip 49561⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4956 -ip 49561⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4956 -ip 49561⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4956 -ip 49561⤵PID:3540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4956 -ip 49561⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4956 -ip 49561⤵PID:3336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4956 -ip 49561⤵PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4956 -ip 49561⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4956 -ip 49561⤵PID:1760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4956 -ip 49561⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4956 -ip 49561⤵PID:2480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4956 -ip 49561⤵PID:1672
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1560 -ip 15601⤵PID:1872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1560 -ip 15601⤵PID:3808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1560 -ip 15601⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1560 -ip 15601⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1560 -ip 15601⤵PID:544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1560 -ip 15601⤵PID:1216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1560 -ip 15601⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1560 -ip 15601⤵PID:712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1560 -ip 15601⤵PID:4368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1560 -ip 15601⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1560 -ip 15601⤵PID:2988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1560 -ip 15601⤵PID:2864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1560 -ip 15601⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 1560 -ip 15601⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1560 -ip 15601⤵PID:944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 1560 -ip 15601⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 1560 -ip 15601⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1560 -ip 15601⤵PID:3780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1560 -ip 15601⤵PID:3756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 1560 -ip 15601⤵PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 1560 -ip 15601⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 1560 -ip 15601⤵PID:280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 1560 -ip 15601⤵PID:3892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 1560 -ip 15601⤵PID:1392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 1560 -ip 15601⤵PID:1500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD528d044da9be1d676029c798286f8590a
SHA10fed80b30ac59ebb64efe8892ad04415e96fb8dc
SHA2564f4ef84d445eb6c921f14bdc76b1800763cff5cf7472e568fdbd57b6b2bdf53f
SHA512145ce9a570a06a33a132d7e53cb07814d5e1d5cd3d3c6313f845dbaa1efab2f5220be0e74e402430dbef5f2143cc8ae2f1d4af7b74525f3747e347355376044d
-
Filesize
33KB
MD528d044da9be1d676029c798286f8590a
SHA10fed80b30ac59ebb64efe8892ad04415e96fb8dc
SHA2564f4ef84d445eb6c921f14bdc76b1800763cff5cf7472e568fdbd57b6b2bdf53f
SHA512145ce9a570a06a33a132d7e53cb07814d5e1d5cd3d3c6313f845dbaa1efab2f5220be0e74e402430dbef5f2143cc8ae2f1d4af7b74525f3747e347355376044d
-
Filesize
1.0MB
MD5ea152391202b4fcef52ec714ae5684bb
SHA10646192dd09e55ab2958fb753fc801d1ff293dcc
SHA25694d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04
SHA5120940fb9e270d180d5b1b68b7db15425d20ba314a41da7042b07008312fa98ffbce21c78ca677b22eaea2e4b7b1b58fe9d38aa1483a93ef00cce1f5d9d3d83048
-
Filesize
1.0MB
MD5ea152391202b4fcef52ec714ae5684bb
SHA10646192dd09e55ab2958fb753fc801d1ff293dcc
SHA25694d9aab8b2afbd6321cdc1d71cf61e2ca6396d7374221335cc6a7ea7bbae3e04
SHA5120940fb9e270d180d5b1b68b7db15425d20ba314a41da7042b07008312fa98ffbce21c78ca677b22eaea2e4b7b1b58fe9d38aa1483a93ef00cce1f5d9d3d83048
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350