Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17/12/2022, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
d51939edbdbcefd39c6daf757dcc9182ae9107b92b1a872144e2bb8e4f5302b4.exe
Resource
win10v2004-20220812-en
General
-
Target
d51939edbdbcefd39c6daf757dcc9182ae9107b92b1a872144e2bb8e4f5302b4.exe
-
Size
214KB
-
MD5
68521d671628e38efa5f153a045cc99c
-
SHA1
3c1c901111af01ca595e9838ae653724916aa6f7
-
SHA256
d51939edbdbcefd39c6daf757dcc9182ae9107b92b1a872144e2bb8e4f5302b4
-
SHA512
7ba01c6d8aa578805e54857fd0739beee539a5da37d9287122f88b1b117780fba7ee579477213cbc612d9f001583abf9eef8b8947dcd809fab2193697339eb57
-
SSDEEP
3072:l4jiRAvLGLTR4sD9LTRJQ6rTkNCojMyXAC8/g3xoOo/knG3ERWR3Le:yjiuvLG+sDFRTkCogyQfg3CO/GU0V6
Malware Config
Extracted
danabot
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
type
loader
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/5012-133-0x00000000001F0000-0x00000000001F9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1452 E573.exe 4188 Orwtaofpwtre.exe 316 182C.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation E573.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 760 Process not Found 3604 chrome.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1452 set thread context of 4668 1452 E573.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 4092 4668 WerFault.exe 94 5100 3604 WerFault.exe 93 2588 316 WerFault.exe 106 3508 1452 WerFault.exe 90 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d51939edbdbcefd39c6daf757dcc9182ae9107b92b1a872144e2bb8e4f5302b4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d51939edbdbcefd39c6daf757dcc9182ae9107b92b1a872144e2bb8e4f5302b4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d51939edbdbcefd39c6daf757dcc9182ae9107b92b1a872144e2bb8e4f5302b4.exe -
Checks processor information in registry 2 TTPs 41 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information E573.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString E573.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 E573.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor E573.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision E573.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data E573.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString E573.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz E573.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet E573.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status E573.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor E573.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 E573.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision E573.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier E573.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 E573.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 E573.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 E573.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data E573.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier E573.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier E573.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5012 d51939edbdbcefd39c6daf757dcc9182ae9107b92b1a872144e2bb8e4f5302b4.exe 5012 d51939edbdbcefd39c6daf757dcc9182ae9107b92b1a872144e2bb8e4f5302b4.exe 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 316 182C.exe 760 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5012 d51939edbdbcefd39c6daf757dcc9182ae9107b92b1a872144e2bb8e4f5302b4.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 4188 Orwtaofpwtre.exe Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found Token: SeDebugPrivilege 760 Process not Found Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4188 Orwtaofpwtre.exe 3604 chrome.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4188 Orwtaofpwtre.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3604 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 760 wrote to memory of 1452 760 Process not Found 90 PID 760 wrote to memory of 1452 760 Process not Found 90 PID 760 wrote to memory of 1452 760 Process not Found 90 PID 1452 wrote to memory of 4188 1452 E573.exe 91 PID 1452 wrote to memory of 4188 1452 E573.exe 91 PID 1452 wrote to memory of 4188 1452 E573.exe 91 PID 760 wrote to memory of 3604 760 Process not Found 93 PID 760 wrote to memory of 3604 760 Process not Found 93 PID 3604 wrote to memory of 4772 3604 chrome.exe 92 PID 3604 wrote to memory of 4772 3604 chrome.exe 92 PID 1452 wrote to memory of 4668 1452 E573.exe 94 PID 1452 wrote to memory of 4668 1452 E573.exe 94 PID 1452 wrote to memory of 4668 1452 E573.exe 94 PID 1452 wrote to memory of 4668 1452 E573.exe 94 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 5008 3604 chrome.exe 98 PID 3604 wrote to memory of 2056 3604 chrome.exe 99 PID 3604 wrote to memory of 2056 3604 chrome.exe 99 PID 3604 wrote to memory of 1744 3604 chrome.exe 101 PID 3604 wrote to memory of 1744 3604 chrome.exe 101 PID 3604 wrote to memory of 1744 3604 chrome.exe 101 PID 3604 wrote to memory of 1744 3604 chrome.exe 101 PID 3604 wrote to memory of 1744 3604 chrome.exe 101 PID 3604 wrote to memory of 1744 3604 chrome.exe 101 PID 3604 wrote to memory of 1744 3604 chrome.exe 101 PID 3604 wrote to memory of 1744 3604 chrome.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\d51939edbdbcefd39c6daf757dcc9182ae9107b92b1a872144e2bb8e4f5302b4.exe"C:\Users\Admin\AppData\Local\Temp\d51939edbdbcefd39c6daf757dcc9182ae9107b92b1a872144e2bb8e4f5302b4.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5012
-
C:\Users\Admin\AppData\Local\Temp\E573.exeC:\Users\Admin\AppData\Local\Temp\E573.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\Orwtaofpwtre.exe"C:\Users\Admin\AppData\Local\Temp\Orwtaofpwtre.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4188
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Checks processor information in registry
PID:4668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 13123⤵
- Program crash
PID:4092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 14442⤵
- Program crash
PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7d6b4f50,0x7fff7d6b4f60,0x7fff7d6b4f701⤵PID:4772
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --no-first-run --no-default-browser-check --silent-launch --disable-backgrounding-occluded-windows --disable-background-timer-throttling --ran-launcher --profile-directory="Default"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1588,7212129404417190305,3048593724288289837,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1624 /prefetch:22⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1588,7212129404417190305,3048593724288289837,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1664 /prefetch:82⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1588,7212129404417190305,3048593724288289837,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2348 /prefetch:82⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1588,7212129404417190305,3048593724288289837,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3604 /prefetch:82⤵PID:2648
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3604 -s 37322⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4668 -ip 46681⤵PID:60
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2960
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 536 -p 3604 -ip 36041⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\182C.exeC:\Users\Admin\AppData\Local\Temp\182C.exe1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 2682⤵
- Program crash
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 316 -ip 3161⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1452 -ip 14521⤵PID:1924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5cef3a3bce13fff2783b8994a70b95037
SHA1fc868a722827e7e667aff71fe977cfdc643ace62
SHA2567de5993155dddb0d9c365832842b1702b1d3a7a3a0818cc18de65ae5f3abfd15
SHA5128058840bc568bcddf1252f440eb048889b5c3faabe9f6d6b0a7e17cb0139142ec5381b3d06e1aa3941562592693e1bc55a178a1fdbabd51cc1c6f0315eed45e7
-
Filesize
1.5MB
MD5cef3a3bce13fff2783b8994a70b95037
SHA1fc868a722827e7e667aff71fe977cfdc643ace62
SHA2567de5993155dddb0d9c365832842b1702b1d3a7a3a0818cc18de65ae5f3abfd15
SHA5128058840bc568bcddf1252f440eb048889b5c3faabe9f6d6b0a7e17cb0139142ec5381b3d06e1aa3941562592693e1bc55a178a1fdbabd51cc1c6f0315eed45e7
-
Filesize
4.2MB
MD59e91c32b888335e331d2b2bce4dcc6e5
SHA1b5296fb410921fbc4704414c0ae5b9f66fdf8827
SHA25604d2372a5d64fda367c1fe2bbaff93d609beac0aef98dde396e4c2290a54f5cf
SHA512a1d3628edcef3bd51433126397878c4a7deb0723ff467423a54b6d62f765e3812dd76a39b774281973297bffb33e177e719d6cfa0ae12312692b6d027733b673
-
Filesize
4.2MB
MD59e91c32b888335e331d2b2bce4dcc6e5
SHA1b5296fb410921fbc4704414c0ae5b9f66fdf8827
SHA25604d2372a5d64fda367c1fe2bbaff93d609beac0aef98dde396e4c2290a54f5cf
SHA512a1d3628edcef3bd51433126397878c4a7deb0723ff467423a54b6d62f765e3812dd76a39b774281973297bffb33e177e719d6cfa0ae12312692b6d027733b673
-
Filesize
1.2MB
MD550e03c260a0f6db796aa22d7443aa105
SHA1573a47d22475dc990d57cdd33b0952b721e4ddd9
SHA2565b71ae23c39fbcd56d58ad59d4b13b0346f1f162bc5089b3ea4be35c0e621065
SHA5124528944754d4f6fae49d63c30377913ea4cf6741a37da8c91fc8ad1006fde8065de9aa96c5de03c84b78a27aecffbf43de9daa94f25408c866c605394a71d434
-
Filesize
1.2MB
MD550e03c260a0f6db796aa22d7443aa105
SHA1573a47d22475dc990d57cdd33b0952b721e4ddd9
SHA2565b71ae23c39fbcd56d58ad59d4b13b0346f1f162bc5089b3ea4be35c0e621065
SHA5124528944754d4f6fae49d63c30377913ea4cf6741a37da8c91fc8ad1006fde8065de9aa96c5de03c84b78a27aecffbf43de9daa94f25408c866c605394a71d434