Analysis
-
max time kernel
0s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 18:30
Static task
static1
General
-
Target
618969df2d98c660836fc0c94f95d93c8c561f19f106c56eca3f5aa9930cbba8.exe
-
Size
2.9MB
-
MD5
478c7cd1d366a77444568d45f252abeb
-
SHA1
0e717c6fc62ece11a17919ce1f1cc5cdc1bc711e
-
SHA256
618969df2d98c660836fc0c94f95d93c8c561f19f106c56eca3f5aa9930cbba8
-
SHA512
541d2430bb2bedffd8d489bcbe77d2cdc2207b8faa88affb7312469e1fcf6de8d8b810b66906f61dd0b8ba95a04309184478bbb69cac6161e9b0b2625b2f45de
-
SSDEEP
49152:9gIxFNiOIkvx2ldpBGld+BvTljVvDq88tnuiRLAKDw8rE6xjHgCF8jv4IGKctXug:ycnIkElbBGld+fFqNcKRxlASSvLGKMXd
Malware Config
Extracted
gcleaner
194.145.227.161
Extracted
nullmixer
http://hsiens.xyz/
Extracted
vidar
40.5
706
https://gheorghip.tumblr.com/
-
profile_id
706
Extracted
redline
Lyla
95.181.172.207:56915
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3304-200-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/3304-200-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
OnlyLogger payload 2 IoCs
resource yara_rule behavioral2/memory/4944-161-0x0000000002DE0000-0x0000000002E28000-memory.dmp family_onlylogger behavioral2/memory/4944-164-0x0000000000400000-0x0000000002B61000-memory.dmp family_onlylogger -
Vidar Stealer 3 IoCs
resource yara_rule behavioral2/memory/3204-147-0x0000000000400000-0x0000000002BB2000-memory.dmp family_vidar behavioral2/memory/3204-124-0x0000000004810000-0x00000000048E1000-memory.dmp family_vidar behavioral2/memory/3204-248-0x0000000000400000-0x0000000002BB2000-memory.dmp family_vidar -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Program crash 31 IoCs
pid pid_target Process procid_target 1248 3852 WerFault.exe 26 5252 4944 WerFault.exe 32 1424 4944 WerFault.exe 32 4024 4944 WerFault.exe 32 3920 3976 WerFault.exe 44 4496 4944 WerFault.exe 32 5204 4944 WerFault.exe 32 3256 4944 WerFault.exe 32 3176 4944 WerFault.exe 32 5944 4944 WerFault.exe 32 4456 4944 WerFault.exe 32 6580 5168 WerFault.exe 43 6564 1740 WerFault.exe 172 6956 4944 WerFault.exe 32 3588 4944 WerFault.exe 32 7068 4944 WerFault.exe 32 7160 4944 WerFault.exe 32 6252 4944 WerFault.exe 32 6348 4764 WerFault.exe 184 2456 3820 WerFault.exe 67 6964 2668 WerFault.exe 68 6360 6584 WerFault.exe 207 4068 3204 WerFault.exe 51 208 6348 WerFault.exe 222 6940 5432 WerFault.exe 235 5376 432 WerFault.exe 247 1792 316 WerFault.exe 255 6748 4944 WerFault.exe 32 532 4944 WerFault.exe 32 5484 4944 WerFault.exe 32 4292 1408 WerFault.exe 263 -
Kills process with taskkill 1 IoCs
pid Process 3076 taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\618969df2d98c660836fc0c94f95d93c8c561f19f106c56eca3f5aa9930cbba8.exe"C:\Users\Admin\AppData\Local\Temp\618969df2d98c660836fc0c94f95d93c8c561f19f106c56eca3f5aa9930cbba8.exe"1⤵PID:5636
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\setup_install.exe"3⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 5884⤵
- Program crash
PID:1248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon23fdeac222bf0c6d.exe4⤵PID:5716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon2347c35b4c69dbf76.exe4⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 3685⤵
- Program crash
PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon23a436abd6542c.exe /mixone4⤵PID:2668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 3885⤵
- Program crash
PID:6964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon2310124f65.exe4⤵PID:3804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon23f7a44a23bc7.exe4⤵PID:2832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon23125dbbd055c928.exe4⤵PID:5740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon2313143945.exe4⤵PID:2828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon237c3c6d262ea.exe4⤵PID:2696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon2339edf58bddc71d.exe4⤵PID:5700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:1144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon2339edf58bddc71d.exeMon2339edf58bddc71d.exe1⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\is-VL6T1.tmp\Mon2339edf58bddc71d.tmp"C:\Users\Admin\AppData\Local\Temp\is-VL6T1.tmp\Mon2339edf58bddc71d.tmp" /SL5="$C0068,506127,422400,C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon2339edf58bddc71d.exe"2⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon23f7a44a23bc7.exeMon23f7a44a23bc7.exe1⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon23a436abd6542c.exeMon23a436abd6542c.exe /mixone1⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 6202⤵
- Program crash
PID:5252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 6562⤵
- Program crash
PID:1424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 7482⤵
- Program crash
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 7682⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 6482⤵
- Program crash
PID:5204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 8442⤵
- Program crash
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 10482⤵
- Program crash
PID:3176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 10562⤵
- Program crash
PID:5944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 12722⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 13642⤵
- Program crash
PID:6956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 14882⤵
- Program crash
PID:3588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 15642⤵
- Program crash
PID:7068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 15842⤵
- Program crash
PID:7160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 15562⤵
- Program crash
PID:6252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 12162⤵
- Program crash
PID:6748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 7722⤵
- Program crash
PID:532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 11042⤵
- Program crash
PID:5484
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe1⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe1⤵PID:4484
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe1⤵
- Kills process with taskkill
PID:3076
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe1⤵PID:5608
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3852 -ip 38521⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon23125dbbd055c928.exeMon23125dbbd055c928.exe1⤵PID:5168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 552682⤵
- Program crash
PID:6580
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon2310124f65.exeMon2310124f65.exe1⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 3722⤵
- Program crash
PID:3920
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeMon237c3c6d262ea.exe1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:5452
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:5300
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6412
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6204
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6808
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6308
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6564
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6896
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6576
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6592
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:368
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6352
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6944
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:7112
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6520
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6188
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6572
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6292
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6836
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:2424
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:3788
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6536
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 123⤵
- Program crash
PID:1792
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6096
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6952
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6704
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:4992
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:5840
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exeC:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon237c3c6d262ea.exe2⤵PID:6616
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon23fdeac222bf0c6d.exeMon23fdeac222bf0c6d.exe1⤵PID:3392
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y2⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/2⤵PID:6072
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1888,i,2799431723598247523,7810107394932188612,131072 /prefetch:13⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3520 --field-trial-handle=1888,i,2799431723598247523,7810107394932188612,131072 /prefetch:13⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3452 --field-trial-handle=1888,i,2799431723598247523,7810107394932188612,131072 /prefetch:13⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1888,i,2799431723598247523,7810107394932188612,131072 /prefetch:13⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1260 --field-trial-handle=1888,i,2799431723598247523,7810107394932188612,131072 /prefetch:83⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=2132 --field-trial-handle=1888,i,2799431723598247523,7810107394932188612,131072 /prefetch:83⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1888,i,2799431723598247523,7810107394932188612,131072 /prefetch:23⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4284 --field-trial-handle=1888,i,2799431723598247523,7810107394932188612,131072 /prefetch:13⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1076 --field-trial-handle=1888,i,2799431723598247523,7810107394932188612,131072 /prefetch:23⤵PID:5372
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon2347c35b4c69dbf76.exeMon2347c35b4c69dbf76.exe1⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\7zSCB34D817\Mon2313143945.exeMon2313143945.exe1⤵PID:3204
-
C:\ProgramData\Java Updater\5uy59559.exe/prstb2⤵PID:6640
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:4764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 11404⤵
- Program crash
PID:6348
-
-
-
-
C:\ProgramData\Java Updater\5uy59559.exe/prstb2⤵PID:1940
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:6584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6584 -s 10484⤵
- Program crash
PID:6360
-
-
-
-
C:\ProgramData\Java Updater\5uy59559.exe/prstb2⤵PID:3792
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:6348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6348 -s 10764⤵
- Program crash
PID:208
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 20202⤵
- Program crash
PID:4068
-
-
C:\ProgramData\Java Updater\5uy59559.exe/prstb2⤵PID:6584
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:5432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5432 -s 10804⤵
- Program crash
PID:6940
-
-
-
-
C:\ProgramData\Java Updater\5uy59559.exe/prstb2⤵PID:2256
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 11364⤵
- Program crash
PID:5376
-
-
-
-
C:\ProgramData\Java Updater\5uy59559.exe/prstb2⤵PID:5828
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 11564⤵
- Program crash
PID:4292
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3976 -ip 39761⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4944 -ip 49441⤵PID:6132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4944 -ip 49441⤵PID:536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4944 -ip 49441⤵PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4944 -ip 49441⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4944 -ip 49441⤵PID:1712
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffa0ac49758,0x7ffa0ac49768,0x7ffa0ac497781⤵PID:1568
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4944 -ip 49441⤵PID:2288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4944 -ip 49441⤵PID:5700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4944 -ip 49441⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4944 -ip 49441⤵PID:5636
-
C:\Users\Admin\AppData\Local\Temp\BC89.exeC:\Users\Admin\AppData\Local\Temp\BC89.exe1⤵PID:1136
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 11443⤵
- Program crash
PID:6564
-
-
-
C:\Users\Admin\AppData\Local\Temp\C5F1.exeC:\Users\Admin\AppData\Local\Temp\C5F1.exe1⤵PID:6188
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"2⤵PID:6276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5168 -ip 51681⤵PID:6548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 1740 -ip 17401⤵PID:1272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4944 -ip 49441⤵PID:6944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4944 -ip 49441⤵PID:3672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4944 -ip 49441⤵PID:7048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4944 -ip 49441⤵PID:7120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4944 -ip 49441⤵PID:5944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4764 -ip 47641⤵PID:6216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3820 -ip 38201⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2668 -ip 26681⤵PID:2464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 6584 -ip 65841⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3204 -ip 32041⤵PID:6464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 6348 -ip 63481⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 5432 -ip 54321⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 432 -ip 4321⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 316 -ip 3161⤵PID:1872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4944 -ip 49441⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4944 -ip 49441⤵PID:1632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4944 -ip 49441⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1408 -ip 14081⤵PID:1476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD525a3f965b2b75ef3c06ef63ebca85bad
SHA19f710e12483af4f7e6a20fe000b2a671a1a05cd3
SHA256de3988a0d61404cf3e74b6cc72d2eec979952360ff6ae703f3f51ba5c6d9d925
SHA51270ae1147ab8b8c7cbeffa1cbf8a8a9ddf39f766791c4ef5ea4454efe53b7d40eaed80320d6959209b26ad214eaca38d5727fa56516b40e63ac24ab20fc41d430