Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2023, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
f28dfd38523e34dea9a8e16ed4354fe8d52610ba40e1e9ba366a62197c5aba83.exe
Resource
win10v2004-20221111-en
General
-
Target
f28dfd38523e34dea9a8e16ed4354fe8d52610ba40e1e9ba366a62197c5aba83.exe
-
Size
261KB
-
MD5
a8bc65f75a40b2c1b2626fd09942fdb1
-
SHA1
465fa2356918d95fa5f3132aebc3b0e5dbd8315f
-
SHA256
f28dfd38523e34dea9a8e16ed4354fe8d52610ba40e1e9ba366a62197c5aba83
-
SHA512
d05c39346d1d30741d0d92ddbf68151a45f2d3712b1945475e78d80e63fd292328ec5a6a6a05d09d3955a125e036030105259acdaec3dde6f1c33292b0705508
-
SSDEEP
3072:lXWwvOItT55jJH4FUC98dYQ8H81Ik9CEwI2BPongMe5LRFYUEA7:hLLtTvJwUCWYhc1Hf26IwUR
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/4884-133-0x0000000002C70000-0x0000000002C79000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 36 1088 rundll32.exe 39 1088 rundll32.exe 70 1088 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 224 E796.exe -
Loads dropped DLL 1 IoCs
pid Process 1088 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1088 set thread context of 4248 1088 rundll32.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3820 224 WerFault.exe 87 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f28dfd38523e34dea9a8e16ed4354fe8d52610ba40e1e9ba366a62197c5aba83.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f28dfd38523e34dea9a8e16ed4354fe8d52610ba40e1e9ba366a62197c5aba83.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f28dfd38523e34dea9a8e16ed4354fe8d52610ba40e1e9ba366a62197c5aba83.exe -
Checks processor information in registry 2 TTPs 27 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e003100000000002d56230c100054656d7000003a0009000400efbe6b55586c2d56230c2e0000000000000000000000000000000000000000000000000023fdbe00540065006d007000000014000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2752 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4884 f28dfd38523e34dea9a8e16ed4354fe8d52610ba40e1e9ba366a62197c5aba83.exe 4884 f28dfd38523e34dea9a8e16ed4354fe8d52610ba40e1e9ba366a62197c5aba83.exe 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2752 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4884 f28dfd38523e34dea9a8e16ed4354fe8d52610ba40e1e9ba366a62197c5aba83.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeShutdownPrivilege 2752 Process not Found Token: SeCreatePagefilePrivilege 2752 Process not Found Token: SeDebugPrivilege 1088 rundll32.exe Token: SeShutdownPrivilege 2752 Process not Found Token: SeCreatePagefilePrivilege 2752 Process not Found Token: SeShutdownPrivilege 2752 Process not Found Token: SeCreatePagefilePrivilege 2752 Process not Found Token: SeShutdownPrivilege 2752 Process not Found Token: SeCreatePagefilePrivilege 2752 Process not Found Token: SeShutdownPrivilege 2752 Process not Found Token: SeCreatePagefilePrivilege 2752 Process not Found Token: SeShutdownPrivilege 2752 Process not Found Token: SeCreatePagefilePrivilege 2752 Process not Found Token: SeShutdownPrivilege 2752 Process not Found Token: SeCreatePagefilePrivilege 2752 Process not Found Token: SeShutdownPrivilege 2752 Process not Found Token: SeCreatePagefilePrivilege 2752 Process not Found Token: SeShutdownPrivilege 2752 Process not Found Token: SeCreatePagefilePrivilege 2752 Process not Found Token: SeShutdownPrivilege 2752 Process not Found Token: SeCreatePagefilePrivilege 2752 Process not Found Token: SeShutdownPrivilege 2752 Process not Found Token: SeCreatePagefilePrivilege 2752 Process not Found -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 4248 rundll32.exe 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found 1088 rundll32.exe 2752 Process not Found 2752 Process not Found 2752 Process not Found 2752 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 Process not Found 2752 Process not Found -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2752 wrote to memory of 224 2752 Process not Found 87 PID 2752 wrote to memory of 224 2752 Process not Found 87 PID 2752 wrote to memory of 224 2752 Process not Found 87 PID 224 wrote to memory of 1088 224 E796.exe 89 PID 224 wrote to memory of 1088 224 E796.exe 89 PID 224 wrote to memory of 1088 224 E796.exe 89 PID 1088 wrote to memory of 4248 1088 rundll32.exe 92 PID 1088 wrote to memory of 4248 1088 rundll32.exe 92 PID 1088 wrote to memory of 4248 1088 rundll32.exe 92 PID 1088 wrote to memory of 3512 1088 rundll32.exe 93 PID 1088 wrote to memory of 3512 1088 rundll32.exe 93 PID 1088 wrote to memory of 3512 1088 rundll32.exe 93 PID 1088 wrote to memory of 3456 1088 rundll32.exe 95 PID 1088 wrote to memory of 3456 1088 rundll32.exe 95 PID 1088 wrote to memory of 3456 1088 rundll32.exe 95 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f28dfd38523e34dea9a8e16ed4354fe8d52610ba40e1e9ba366a62197c5aba83.exe"C:\Users\Admin\AppData\Local\Temp\f28dfd38523e34dea9a8e16ed4354fe8d52610ba40e1e9ba366a62197c5aba83.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4884
-
C:\Users\Admin\AppData\Local\Temp\E796.exeC:\Users\Admin\AppData\Local\Temp\E796.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Rruwtqrefy.tmp",Uuhpdwiyer2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1088 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 172093⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4248
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:3512
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:3456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 5322⤵
- Program crash
PID:3820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 224 -ip 2241⤵PID:1052
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c088c584d212722dec3d0f314e9db13f
SHA147ebab6ed8406a85cee35b712155233b7bbde36c
SHA256be70db44047daa4804e8dcb3308d134490c3b0d9ffd9c847cecb1313764501c2
SHA51234d2cc0bdda0e200156f67a20760bd1ac289ce9a70949b74caf1b53186bbd497706244638c164f8636324b4366d63cee67baabe114429aa9ff3a1c16fa69b041
-
Filesize
1.1MB
MD5c088c584d212722dec3d0f314e9db13f
SHA147ebab6ed8406a85cee35b712155233b7bbde36c
SHA256be70db44047daa4804e8dcb3308d134490c3b0d9ffd9c847cecb1313764501c2
SHA51234d2cc0bdda0e200156f67a20760bd1ac289ce9a70949b74caf1b53186bbd497706244638c164f8636324b4366d63cee67baabe114429aa9ff3a1c16fa69b041
-
Filesize
805KB
MD544d724c9ad9ae3149d4997852eea3e96
SHA1dcd92e1b704b3f25ba455e079004c5a5aaf903f9
SHA256c5cd7d52ba95127c18556a2ddca64e4ef80a2945e6579545c0067abdab3a0ad0
SHA512791c3b62685a475799a991b2f0f9535781c888d48d1dd47b5b2cd407ff46e15231247f07ceb63c012bd923bf88fffaecf29030186e3d569b9886048881012e44
-
Filesize
805KB
MD544d724c9ad9ae3149d4997852eea3e96
SHA1dcd92e1b704b3f25ba455e079004c5a5aaf903f9
SHA256c5cd7d52ba95127c18556a2ddca64e4ef80a2945e6579545c0067abdab3a0ad0
SHA512791c3b62685a475799a991b2f0f9535781c888d48d1dd47b5b2cd407ff46e15231247f07ceb63c012bd923bf88fffaecf29030186e3d569b9886048881012e44