Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2023 15:45
Static task
static1
Behavioral task
behavioral1
Sample
27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe
Resource
win7-20230831-en
General
-
Target
27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe
-
Size
795KB
-
MD5
102dfca73df9a539a34b886349365381
-
SHA1
35b90a9ae3dc136502102017c0488c5fc028eae1
-
SHA256
27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9
-
SHA512
4335a75a836ebb5c9f589d36bd9b96fa6c3c751ff37caf23805317cdd5082fef0fb3ed198ebdb90cde6e9700d4b0ede2233b6bab8cb421d193c1099510733316
-
SSDEEP
12288:Q84kSMdr3GNUAn9cNNeX8X/iTS46omh7lZyxa6A0KG384C26ygrxNU4Jpth9+8PZ:Q8fUc6ApGLC7ysxD1d/4e
Malware Config
Extracted
xpertrat
3.0.10
STRIGIO
sandshoe.myfirewall.org:5344
I8N3F0X7-G4E2-P2S0-T0D7-R1N2H5T660I4
Signatures
-
Processes:
27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe -
Processes:
27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe -
XpertRAT Core payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4752-19-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat -
Processes:
27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe -
Processes:
27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe -
Program crash 37 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 968 4752 WerFault.exe iexplore.exe 708 1800 WerFault.exe iexplore.exe 1924 1236 WerFault.exe iexplore.exe 2308 5108 WerFault.exe iexplore.exe 2520 2004 WerFault.exe iexplore.exe 4580 2140 WerFault.exe iexplore.exe 488 1828 WerFault.exe iexplore.exe 1040 3444 WerFault.exe iexplore.exe 3080 1644 WerFault.exe iexplore.exe 3652 660 WerFault.exe iexplore.exe 4428 3416 WerFault.exe iexplore.exe 3640 4964 WerFault.exe iexplore.exe 3324 980 WerFault.exe iexplore.exe 2948 2804 WerFault.exe iexplore.exe 4952 2392 WerFault.exe iexplore.exe 3380 2844 WerFault.exe iexplore.exe 4504 2548 WerFault.exe iexplore.exe 2544 4928 WerFault.exe iexplore.exe 900 3208 WerFault.exe iexplore.exe 2072 1156 WerFault.exe iexplore.exe 3760 4424 WerFault.exe iexplore.exe 2944 1564 WerFault.exe iexplore.exe 4084 1172 WerFault.exe iexplore.exe 3708 4744 WerFault.exe iexplore.exe 3176 1832 WerFault.exe iexplore.exe 1048 2272 WerFault.exe iexplore.exe 1888 3688 WerFault.exe iexplore.exe 4760 2028 WerFault.exe iexplore.exe 3756 1332 WerFault.exe iexplore.exe 216 4576 WerFault.exe iexplore.exe 1476 2752 WerFault.exe iexplore.exe 2284 2320 WerFault.exe iexplore.exe 3440 404 WerFault.exe iexplore.exe 748 3084 WerFault.exe iexplore.exe 5060 3464 WerFault.exe iexplore.exe 3868 3404 WerFault.exe iexplore.exe 3684 444 WerFault.exe iexplore.exe -
Suspicious use of SetThreadContext 38 IoCs
Processes:
27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exedescription pid process target process PID 3976 set thread context of 4716 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe PID 4716 set thread context of 4752 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 1800 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 1236 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 5108 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 2004 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 2140 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 1828 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 3444 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 1644 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 660 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 3416 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 4964 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 980 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 2804 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 2392 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 2844 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 2548 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 4928 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 3208 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 1156 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 4424 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 1564 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 1172 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 4744 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 1832 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 2272 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 3688 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 2028 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 1332 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 4576 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 2752 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 2320 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 404 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 3084 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 3464 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 3404 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 set thread context of 444 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exepid process 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exedescription pid process Token: SeDebugPrivilege 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exepid process 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
iexplore.exeiexplore.exepid process 2004 iexplore.exe 2272 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exedescription pid process target process PID 3976 wrote to memory of 2312 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe PID 3976 wrote to memory of 2312 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe PID 3976 wrote to memory of 2312 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe PID 3976 wrote to memory of 4716 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe PID 3976 wrote to memory of 4716 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe PID 3976 wrote to memory of 4716 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe PID 3976 wrote to memory of 4716 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe PID 3976 wrote to memory of 4716 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe PID 3976 wrote to memory of 4716 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe PID 3976 wrote to memory of 4716 3976 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe PID 4716 wrote to memory of 4752 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 4752 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 4752 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 4752 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 4752 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 4752 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 4752 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 4752 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1800 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1800 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1800 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1800 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1800 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1800 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1800 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1800 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1236 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1236 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1236 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1236 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1236 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1236 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1236 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1236 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 5108 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 5108 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 5108 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 5108 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 5108 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 5108 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 5108 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 5108 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2004 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2004 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2004 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2004 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2004 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2004 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2004 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2004 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2140 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2140 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2140 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2140 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2140 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2140 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2140 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 2140 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1828 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1828 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1828 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1828 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1828 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe PID 4716 wrote to memory of 1828 4716 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe iexplore.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe"C:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe"C:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe"C:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe"2⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
- Suspicious use of UnmapMainImage
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 660 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
- Suspicious use of UnmapMainImage
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 124⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\27216219fbe93818c217c05b66b6586ab58bb000b1c9bc96da93561923f1fce9_JC.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4752 -ip 47521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1800 -ip 18001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1236 -ip 12361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5108 -ip 51081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2004 -ip 20041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2140 -ip 21401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1828 -ip 18281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3444 -ip 34441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1644 -ip 16441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 660 -ip 6601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3416 -ip 34161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4964 -ip 49641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 980 -ip 9801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2804 -ip 28041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2392 -ip 23921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2844 -ip 28441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2548 -ip 25481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4928 -ip 49281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3208 -ip 32081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1156 -ip 11561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4424 -ip 44241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1564 -ip 15641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1172 -ip 11721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4744 -ip 47441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1832 -ip 18321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2272 -ip 22721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3688 -ip 36881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2028 -ip 20281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1332 -ip 13321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4576 -ip 45761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2752 -ip 27521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2320 -ip 23201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 404 -ip 4041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3084 -ip 30841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3464 -ip 34641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3404 -ip 34041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 444 -ip 4441⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3976-8-0x00000000052F0000-0x0000000005300000-memory.dmpFilesize
64KB
-
memory/3976-4-0x00000000052F0000-0x0000000005300000-memory.dmpFilesize
64KB
-
memory/3976-1-0x0000000074450000-0x0000000074C00000-memory.dmpFilesize
7.7MB
-
memory/3976-3-0x00000000050B0000-0x0000000005142000-memory.dmpFilesize
584KB
-
memory/3976-9-0x0000000005CB0000-0x0000000005CBA000-memory.dmpFilesize
40KB
-
memory/3976-5-0x0000000005090000-0x000000000509A000-memory.dmpFilesize
40KB
-
memory/3976-6-0x0000000005560000-0x0000000005578000-memory.dmpFilesize
96KB
-
memory/3976-10-0x000000000A5E0000-0x000000000A64C000-memory.dmpFilesize
432KB
-
memory/3976-2-0x0000000005580000-0x0000000005B24000-memory.dmpFilesize
5.6MB
-
memory/3976-0-0x00000000005C0000-0x000000000068C000-memory.dmpFilesize
816KB
-
memory/3976-7-0x0000000074450000-0x0000000074C00000-memory.dmpFilesize
7.7MB
-
memory/3976-11-0x000000000D6F0000-0x000000000D78C000-memory.dmpFilesize
624KB
-
memory/3976-17-0x0000000074450000-0x0000000074C00000-memory.dmpFilesize
7.7MB
-
memory/4716-15-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/4716-12-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/4716-23-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/4752-19-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB