Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 03:42
Static task
static1
Behavioral task
behavioral1
Sample
669bb51bb539eaeb45c9163670d84c84.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
669bb51bb539eaeb45c9163670d84c84.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win10v2004-20231222-en
General
-
Target
setup_installer.exe
-
Size
3.8MB
-
MD5
28636401da782ddf74e654e6d946af76
-
SHA1
0f080abd03c143f54bb0cbc7ac682b0c828a000c
-
SHA256
3d7ba99d7b360819146cd6223b2d668e8b1a661023f5b36932860bc84271eecd
-
SHA512
ddf9fe38abe2662d77422875607a9dae6a7b949236cb47730754ea69129daabf270df5edde6b3ec31929c394129c389058c81193c573baa3dfa9941bc3e9b298
-
SSDEEP
98304:xRCvLUBsgni5rb8JnSl9yaBVnzTuSE5wkDb4V6Tr7J:x6LUCgi5rb8ol9RtE5wkAM1
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.171/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.185
Extracted
redline
pab3
185.215.113.15:61506
Extracted
smokeloader
pub5
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral4/memory/1780-95-0x0000000004930000-0x0000000004952000-memory.dmp family_redline behavioral4/memory/1780-105-0x0000000004D00000-0x0000000004D20000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral4/memory/1780-95-0x0000000004930000-0x0000000004952000-memory.dmp family_sectoprat behavioral4/memory/1780-105-0x0000000004D00000-0x0000000004D20000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 3 IoCs
resource yara_rule behavioral4/memory/1964-147-0x0000000004850000-0x00000000048ED000-memory.dmp family_vidar behavioral4/memory/1964-149-0x0000000000400000-0x0000000002D12000-memory.dmp family_vidar behavioral4/memory/1964-195-0x0000000000400000-0x0000000002D12000-memory.dmp family_vidar -
resource yara_rule behavioral4/files/0x0006000000023209-49.dat aspack_v212_v242 behavioral4/files/0x00080000000231f0-47.dat aspack_v212_v242 behavioral4/files/0x0006000000023209-45.dat aspack_v212_v242 behavioral4/files/0x0007000000023203-43.dat aspack_v212_v242 -
Executes dropped EXE 13 IoCs
pid Process 368 smss.exe 5000 smss.exe 2132 smss.exe 3604 smss.exe 1964 smss.exe 1780 smss.exe 4224 smss.exe 2940 smss.exe 3908 smss.exe 1408 smss.exe 688 smss.exe 1736 smss.exe 4552 smss.exe -
Loads dropped DLL 6 IoCs
pid Process 368 smss.exe 368 smss.exe 368 smss.exe 368 smss.exe 368 smss.exe 368 smss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" smss.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
pid pid_target Process procid_target 2992 368 WerFault.exe 88 4952 1964 WerFault.exe 106 4764 1964 WerFault.exe 106 4736 1964 WerFault.exe 106 3692 1964 WerFault.exe 106 2104 1964 WerFault.exe 106 1604 1964 WerFault.exe 106 4428 1964 WerFault.exe 106 4240 1964 WerFault.exe 106 2036 1964 WerFault.exe 106 1440 1964 WerFault.exe 106 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI smss.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI smss.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID Process not Found -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Process not Found Key created \REGISTRY\USER\.DEFAULT\Software Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Process not Found -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3848 PING.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3244 powershell.exe 3244 powershell.exe 5000 smss.exe 5000 smss.exe 3244 powershell.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 4956 Process not Found 4052 Process not Found 4372 Process not Found 3044 Process not Found 4144 Process not Found 2084 Process not Found 732 Process not Found 1560 Process not Found 3668 Process not Found 3176 Process not Found 3468 Process not Found 4832 Process not Found 3308 Process not Found 2036 Process not Found 516 Process not Found 2220 Process not Found 1004 Process not Found 1060 Process not Found 5068 Process not Found 2976 Process not Found 396 Process not Found 4980 Process not Found 3740 Process not Found 2100 Process not Found 848 Process not Found 856 Process not Found 796 Process not Found 2664 Process not Found 3084 Process not Found 2668 Process not Found 3940 Process not Found 3412 Process not Found 2184 Process not Found 4212 Process not Found 1484 Process not Found 1932 Process not Found 1876 Process not Found 4748 Process not Found 2012 Process not Found 3332 Process not Found 3124 Process not Found 5016 Process not Found 4480 Process not Found 3968 Process not Found 744 Process not Found 1884 Process not Found 588 Process not Found 2820 Process not Found 1136 Process not Found 3888 Process not Found 1140 Process not Found 1144 Process not Found 2964 Process not Found 1916 Process not Found 920 Process not Found 4940 Process not Found 2304 Process not Found 3704 Process not Found 4736 Process not Found 2896 Process not Found 4112 Process not Found 2956 Process not Found 4344 Process not Found 4192 Process not Found -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2940 smss.exe Token: SeDebugPrivilege 4224 smss.exe Token: SeDebugPrivilege 3244 powershell.exe Token: SeDebugPrivilege 1780 smss.exe Token: SeCreateGlobalPrivilege 2964 Process not Found Token: SeChangeNotifyPrivilege 2964 Process not Found Token: 33 2964 Process not Found Token: SeIncBasePriorityPrivilege 2964 Process not Found Token: SeCreateGlobalPrivilege 732 Process not Found Token: SeChangeNotifyPrivilege 732 Process not Found Token: 33 732 Process not Found Token: SeIncBasePriorityPrivilege 732 Process not Found Token: SeCreateGlobalPrivilege 1212 Process not Found Token: SeChangeNotifyPrivilege 1212 Process not Found Token: 33 1212 Process not Found Token: SeIncBasePriorityPrivilege 1212 Process not Found -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1736 smss.exe 1736 smss.exe 1736 smss.exe 4552 smss.exe 4552 smss.exe 4552 smss.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1736 smss.exe 1736 smss.exe 1736 smss.exe 4552 smss.exe 4552 smss.exe 4552 smss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3488 wrote to memory of 368 3488 Process not Found 26704 PID 3488 wrote to memory of 368 3488 Process not Found 26704 PID 3488 wrote to memory of 368 3488 Process not Found 26704 PID 368 wrote to memory of 3476 368 smss.exe 26163 PID 368 wrote to memory of 3476 368 smss.exe 26163 PID 368 wrote to memory of 3476 368 smss.exe 26163 PID 368 wrote to memory of 3044 368 smss.exe 26932 PID 368 wrote to memory of 3044 368 smss.exe 26932 PID 368 wrote to memory of 3044 368 smss.exe 26932 PID 368 wrote to memory of 1884 368 smss.exe 26936 PID 368 wrote to memory of 1884 368 smss.exe 26936 PID 368 wrote to memory of 1884 368 smss.exe 26936 PID 368 wrote to memory of 4504 368 smss.exe 26770 PID 368 wrote to memory of 4504 368 smss.exe 26770 PID 368 wrote to memory of 4504 368 smss.exe 26770 PID 368 wrote to memory of 868 368 smss.exe 26034 PID 368 wrote to memory of 868 368 smss.exe 26034 PID 368 wrote to memory of 868 368 smss.exe 26034 PID 368 wrote to memory of 1972 368 smss.exe 26771 PID 368 wrote to memory of 1972 368 smss.exe 26771 PID 368 wrote to memory of 1972 368 smss.exe 26771 PID 368 wrote to memory of 2020 368 smss.exe 26772 PID 368 wrote to memory of 2020 368 smss.exe 26772 PID 368 wrote to memory of 2020 368 smss.exe 26772 PID 368 wrote to memory of 3704 368 smss.exe 26888 PID 368 wrote to memory of 3704 368 smss.exe 26888 PID 368 wrote to memory of 3704 368 smss.exe 26888 PID 368 wrote to memory of 1632 368 smss.exe 26033 PID 368 wrote to memory of 1632 368 smss.exe 26033 PID 368 wrote to memory of 1632 368 smss.exe 26033 PID 368 wrote to memory of 1204 368 smss.exe 26035 PID 368 wrote to memory of 1204 368 smss.exe 26035 PID 368 wrote to memory of 1204 368 smss.exe 26035 PID 1884 wrote to memory of 5000 1884 smss.exe 26388 PID 1884 wrote to memory of 5000 1884 smss.exe 26388 PID 1884 wrote to memory of 5000 1884 smss.exe 26388 PID 4504 wrote to memory of 2132 4504 smss.exe 26768 PID 4504 wrote to memory of 2132 4504 smss.exe 26768 PID 2020 wrote to memory of 3604 2020 smss.exe 26793 PID 2020 wrote to memory of 3604 2020 smss.exe 26793 PID 2020 wrote to memory of 3604 2020 smss.exe 26793 PID 868 wrote to memory of 1964 868 smss.exe 26728 PID 868 wrote to memory of 1964 868 smss.exe 26728 PID 868 wrote to memory of 1964 868 smss.exe 26728 PID 1972 wrote to memory of 1780 1972 smss.exe 26459 PID 1972 wrote to memory of 1780 1972 smss.exe 26459 PID 1972 wrote to memory of 1780 1972 smss.exe 26459 PID 3704 wrote to memory of 4224 3704 smss.exe 26816 PID 3704 wrote to memory of 4224 3704 smss.exe 26816 PID 1204 wrote to memory of 2940 1204 smss.exe 26009 PID 1204 wrote to memory of 2940 1204 smss.exe 26009 PID 3476 wrote to memory of 3244 3476 smss.exe 94 PID 3476 wrote to memory of 3244 3476 smss.exe 94 PID 3476 wrote to memory of 3244 3476 smss.exe 94 PID 1632 wrote to memory of 3908 1632 smss.exe 26743 PID 1632 wrote to memory of 3908 1632 smss.exe 26743 PID 1632 wrote to memory of 3908 1632 smss.exe 26743 PID 3044 wrote to memory of 1408 3044 smss.exe 26843 PID 3044 wrote to memory of 1408 3044 smss.exe 26843 PID 3044 wrote to memory of 1408 3044 smss.exe 26843 PID 3908 wrote to memory of 3980 3908 smss.exe 26508 PID 3908 wrote to memory of 3980 3908 smss.exe 26508 PID 3908 wrote to memory of 3980 3908 smss.exe 26508 PID 3908 wrote to memory of 1596 3908 smss.exe 26744
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\7zS0ADF2407\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0ADF2407\setup_install.exe"2⤵PID:368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 368 -s 5843⤵
- Program crash
PID:2992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed154e8ab94f22a4.exe3⤵PID:1204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed157806d79d1e.exe3⤵PID:1632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed1595f777e32404.exe3⤵PID:3704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed15f94f82567f.exe3⤵PID:2020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed153a7112ac244.exe3⤵PID:1972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed155467a30a93c1b8a.exe3⤵PID:868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed15156f2613c99fcf8.exe3⤵PID:4504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed15251f7879.exe3⤵PID:1884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed155a25e62a3deb4.exe3⤵PID:3044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵PID:3476
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0ADF2407\Wed15251f7879.exeWed15251f7879.exe1⤵PID:5000
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 368 -ip 3681⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\7zS0ADF2407\Wed157806d79d1e.exeWed157806d79d1e.exe1⤵PID:3908
-
C:\Windows\SysWOW64\dllhost.exedllhost.exe2⤵PID:3980
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Del.doc2⤵PID:1596
-
C:\Windows\SysWOW64\cmd.execmd3⤵PID:4076
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^NZrkFJTgsCdMvCokxiUUxUBYmGUZCyshQzrAfUxHKQBByATJNifzJsTTnyLZOTMjkrVrmIWmMjlEaZSZNkkcPXDmmpwppcSQtfd$" Una.doc4⤵PID:3708
-
-
C:\Windows\SysWOW64\PING.EXEping AVCIKYMG -n 304⤵
- Runs ping.exe
PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.comRiconobbe.exe.com H4⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.com H5⤵PID:4552
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0ADF2407\Wed154e8ab94f22a4.exeWed154e8ab94f22a4.exe1⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\7zS0ADF2407\Wed155a25e62a3deb4.exeWed155a25e62a3deb4.exe1⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\7zS0ADF2407\Wed155a25e62a3deb4.exe"C:\Users\Admin\AppData\Local\Temp\7zS0ADF2407\Wed155a25e62a3deb4.exe" -a2⤵PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0ADF2407\Wed1595f777e32404.exeWed1595f777e32404.exe1⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\7zS0ADF2407\Wed153a7112ac244.exeWed153a7112ac244.exe1⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\7zS0ADF2407\Wed155467a30a93c1b8a.exeWed155467a30a93c1b8a.exe1⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 8242⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 8322⤵
- Program crash
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 8762⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 8842⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 9922⤵
- Program crash
PID:2104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 10602⤵
- Program crash
PID:1604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 12122⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 15082⤵
- Program crash
PID:4240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 15762⤵
- Program crash
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 15562⤵
- Program crash
PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0ADF2407\Wed15f94f82567f.exeWed15f94f82567f.exe1⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\7zS0ADF2407\Wed15156f2613c99fcf8.exeWed15156f2613c99fcf8.exe1⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1964 -ip 19641⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1964 -ip 19641⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1964 -ip 19641⤵PID:2036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1964 -ip 19641⤵PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1964 -ip 19641⤵PID:3792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1964 -ip 19641⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1964 -ip 19641⤵PID:1052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1964 -ip 19641⤵PID:1360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1964 -ip 19641⤵PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1964 -ip 19641⤵PID:3968
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:2964
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:732
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1212
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:5016
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2820
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3888
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1144
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1184
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3968
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 0000038c 000000841⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4552
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000290 000000841⤵
- Executes dropped EXE
PID:688
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000290 000000841⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000002a0 000000841⤵PID:3848
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000002d0 000000841⤵PID:4076
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000002d4 000000841⤵
- Suspicious use of WriteProcessMemory
PID:1632
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000002d8 000000841⤵
- Suspicious use of WriteProcessMemory
PID:868
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000002cc 000000841⤵
- Suspicious use of WriteProcessMemory
PID:1204
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000280 000000841⤵PID:3708
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000274 000000841⤵
- Suspicious use of WriteProcessMemory
PID:3476
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000170 000000841⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000110 000000841⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000150 000000841⤵PID:3980
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000098 000000841⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:368
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000e8 000000841⤵
- Executes dropped EXE
PID:1964
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000100 000000841⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3908
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000130 000000841⤵PID:1596
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000104 000000841⤵
- Executes dropped EXE
PID:2132
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000098 000000841⤵
- Suspicious use of WriteProcessMemory
PID:4504
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000e8 000000841⤵
- Suspicious use of WriteProcessMemory
PID:1972
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 0000010c 000000841⤵
- Suspicious use of WriteProcessMemory
PID:2020
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000e4 000000841⤵
- Executes dropped EXE
PID:3604
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000138 000000841⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000114 000000841⤵
- Executes dropped EXE
PID:1408
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000184 000000841⤵
- Suspicious use of WriteProcessMemory
PID:3704
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 00000098 000000841⤵
- Suspicious use of WriteProcessMemory
PID:3044
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 0000015c 000000841⤵
- Suspicious use of WriteProcessMemory
PID:1884
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000cc 000000841⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD55866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
Filesize
135KB
MD5e945895936e176b41974d76b0e879b21
SHA13fd9d9276b74033b1c8b2689552def5fc82ef0fd
SHA2561041326fc137c8291080c6f7f1e180f3d7c51ac99f01a512eea6e34f018377b4
SHA51202d3fcead2c6880527d4a87923ac68a58d0f0f9cf33c410c731ab514b9a5443fc662db2a86eb0efe989a9a2daf15b59f32eba51fab8a7929ce99889870ca39fa
-
Filesize
279KB
MD5af23965c3e2673940b70f436bb45f766
SHA1ccc8b03ea8c568f1b333458cff3f156898fc29f7
SHA256e6271d738fc78602abc8916fb4742638b2b4c4205882f6db24eb361694c67503
SHA512f0202e3ed32b9e69785bb50551b5143fe69298dead3c9a3d539cc6c6768f70f8263f074f912d1de5decb122bc365b7645428c0d10040f6f15a41f3a5ac0a4611
-
Filesize
158KB
MD59636e685cd41f8dd4eb92970d58b7219
SHA19f1bf68b3592c06c00841d1f465fb430784e13f6
SHA256caa4fc5b41a44d9733e4b7e3264a7be6a4981bf4c354e3686f521608a85d390e
SHA512099c6106deb524e9453106c56d4ef006db5078341304e86f7433296d9b64caf2befff98c054fd5bb31379b7093bfb02466290f318564e9428cdd4ad003842f8f
-
Filesize
8KB
MD577c6eb4eb2a045c304ae95ef5bbaa2b2
SHA1eeb4a9ab13957bfafd6e015f65c09ba65b3d699c
SHA2563e35832690fd1115024f918f4bc37e756b1617ae628e55b94f0e04045e57b49b
SHA512e1e7bd4d5a3f80d88b2b0da8b5922fb678b7c63e2e81a37bd01b582c0b5a4d881daaf66a1e2083bbbf0581d42d0eabb8268f9fa5404c3d454fdd68f398d57a87
-
Filesize
529KB
MD54fca50afec28e70724fcbb9eb581c6b5
SHA1ac98c2ca6865fa0ecf66192f4504965d189179cd
SHA256fea6aca8fb47df3789a38508b619ddd48818a081955f53ed7eb67230500d8f29
SHA5120daff8a6a81a8d31e0b51db7a2d430dcf16a7b5c2feb12ea96afa3028f85090bea415f5419c512dc529efe6bcaeb7d243ffe7f01d767b73f7d994929e248f584
-
Filesize
165KB
MD54e81cb778780ed512995f70616a273a5
SHA1c72801c8f9f9123ccf86adc20dfa79685080d8d2
SHA25663df4d6a5445a97ab3174c59e6987a2767e7c3341923038e5cfa89a81c4a0dd9
SHA5125d4e6a0970cd61284226c6594dadd36baaa8f077e8221ce909e61b91e3b9e033b8971d8866155a9f79beb31c0dc6681e0cb0abdffd278d11fb16936f15fb61cf
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
116KB
MD5f12ef77a40ad7d30f0baecd88b932dd2
SHA11af16d67807cc7560313ea054aac11ed2ff8a320
SHA25655289be3e0d231233826dbe36a15ecbbd1d27220d50c666516f81b05bbd5dfe5
SHA512e11d653fe84f6c650212c6569af78ff087e1102f771593f7d1e563b806eae7bf3662d3c4e717d1b29fcc38dd4d7b98ac1dafac15a5299e95f257de36c39d9cc9
-
Filesize
106KB
MD503787a29b0f143635273fb2d57224652
SHA1294f3693d41b7f563732c1660d2ce0a53edcae60
SHA256632a80a9deae6512eebcf8b74e93d6f2b92124ebce4e76301c662f36e697a17c
SHA5124141d89abd8139e1d3054dcb0cd3f35a52a40c69aac4d1d2ec785ff6536ecf84a5e688faeb68ba9ed9ed44c0654d4295c6d3641b5286320ee54106b66fbbcecd
-
Filesize
211KB
MD56acda7462a32813442b15288f5327726
SHA167b26b47361d2dc979cbdb65a56468c41b399852
SHA25647d1a66ebf47b987412c2c11ed1da48800cad3afb745d4c2f41c6214277da3a3
SHA5129f0cdfb149b8b9b66f1ed18b88efb6d445227d710e7b967c1bf5e997bae04ba1e43cd178f2b2fccdab8daeec71db0cd543069afa8774bbc2238b34996b5efe12
-
Filesize
235KB
MD54b6e0e4114a161318592d197ec8f4e2a
SHA1ee20b2c88e4847b0ad33965f984e2357bf4bc0fc
SHA256c3d32db9bf08a6ccbeb1057a4a122ae67f263b4c3817d01e5f3fd404228b366f
SHA512683906cb80f494b8fa897c7e6a8715ac7fcdc9e4b76abfa8159a25713581694455d715505e9329c85b18afa0fb7c9c6be5803b4cde7b0e4baddebf3b5e1b6cbc
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
454KB
MD574642a5e8e5284454593161f88c54e83
SHA14dc29b177664f92d4b04ce71bd85107a60756a84
SHA256971a5004d1a899bf4fa94dc63cbf8ae42f2f1dee1d730d3e826a2a869cfba492
SHA512c9e5439e0b6a92d7c70db859ff1c48a75d57daac3ec3154db1c799ba22450e7889fadc0a1003b7e35484bc48352a8961178ea138260bd8ff94b18bb91fff2a4a
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
234KB
MD57f6eee98c5b16ff02f940321deddd13b
SHA149fe5913521d9fb945a0bc8ebfff5c783bf8ad3f
SHA2567ca655e1269a72aca23e8f0c20aad0467e67ca54c9eed8ddcb5c5b2decd0e185
SHA512895f9c15ab2c075452f446940303a08f40635408e220197e3bd82c83c9d642590d9b47e95a9014bb41a013679e99592a2cf59981707996cb062cbdbc75a48968
-
Filesize
1.3MB
MD579ec9d47a40c1493de53d625a575c3fc
SHA1907040f3c896a050ec6452a15bce4b44d0cd8dc2
SHA256fea1b0428260efd4d22ea9a53f052f985ca3ea0056b8b8671e04e0943fb4b45d
SHA51251490096b59db809f869952461bbeae9eb0fd4e87e87bc70ec53861bcd308b90c23a702f0cf25c2f4862032d657c0dcc50d4232fe023437e4bc6d106cfe9082e
-
Filesize
344KB
MD56dfe7d988e224e2556f138e38c4bfe26
SHA1701da509726d774d49eed5ac189595fe4d27b3bc
SHA256b6808e035856b4945565a9c61c7886ab271d2e395bfa6c15b57a1a7d1f0e907f
SHA51236ad5b2f82744f0902f764f9f58f201047f4b5759ce4849c940c4a2bdc8933679c1fbb72430d60bcd9efff3c289c56596e8013ab37519499884f326995abed21
-
Filesize
200KB
MD57df0531926aff3b36a02d62512d6c982
SHA1336835f535978c20be0511e8f8873d11f39213be
SHA2569e2150542f93fb0dadda6a3b81cae4149c2edd99098eef388165e42743bd8dfc
SHA5120ffebbc8273aea48fe6a8fa06194e3e2ec859ac9c7b4f277195ba004b68dd10502dca33b658a671e2c5cbc16995ac63eb9f44c4ddb6922a25c75ba9f5885eb18
-
Filesize
456B
MD5b8f0b475f6d24c00445ee8e41bef5612
SHA100f735fa5c0c62e49911cc1c191594b2a1511a5d
SHA256cead1703b09c656985fe26c7c73917cf3a6217955594f71dcacbf60fd8726c22
SHA5127207d978bc7df278b33952a3c949adb2bb4b75d8186c37c876c17e3b0702aa4a265768fdc2af1e2d4010706fea419400e11c199c8e932a4e40ce68d5d8b8d158
-
Filesize
118KB
MD5880a3314f8fc5c9657df73e760c4d493
SHA132e10664606daa333133ace8438aa61fd295a90f
SHA256f96de528358a8dc9df84a371766354ff2ff710afe86ef7b4c4a2d305c91b4b97
SHA512cded5edaf4120c7d816b5a3d6f17998c6a5cf6805738fad700178ecbe560fe7bdf875573fc5aedd697f23596a32aa565b41a666c27307fb9086a4e6952a689e3
-
Filesize
85KB
MD59203b43b53c771540eed3a11d79d0993
SHA18e0708f7e8f049ebfb6a2effe665362ce1bd4fcd
SHA256ad3d1cb624ea2f593e78f8ffc79b2ad6a1410858a351943dc85dcc56b064b81d
SHA512300abc80c256c0f278c3363237618ec39869de21c1b47ba54c4de2bbfd5af354d7643e9f9c8b4351d70879244229030c8e82dd62f1b6f1017797f00bf03d5e63
-
Filesize
99KB
MD5b79010109d9e312e5e4820bdb77e3854
SHA1932741fec9fbb48c6427327303cc9a6d07ddd07d
SHA2563b1e0a82d49128316daf1f53ce620869dcace1367f6c3c92b02c94bc2ba42339
SHA512aa2f5bad8bcaac96ab8f8d7c6259d1eabeeae588e97a49cb900c9e7cad4f5d1f65e89131d95369d5bb0820df83230619b4b31099574627e48de4307fa63299c0
-
Filesize
417KB
MD5ee29d384c61545128a75785cb28774c5
SHA19350f2d89c0f37e923338ab8dce74b6292aed569
SHA256d241f5f948418f6242542ffe5fe5c5952614f0ec067937edb17e367e394d27ea
SHA512a9c152a1a44e0274db41ea74cbd0d65283ec77ac98b5f4562b704620e61e2e7652d1d964eef0f0048bb404b00a35364c362229101c5fda845a1b534311702589
-
Filesize
198KB
MD5a3be41234d5853dd29f6b6eaa360eda1
SHA13d70e66e0074cd37f3fd2331c4d166ab91932f9f
SHA256416e90cf9aa9566095df3bfd42c86215f35f915e055c14ff2aa79479b2d58e65
SHA5129233dffb1b224be21b45a26c394af18edc0cd327df2b09fbb746a3d278d151e2f5dde594b476187d7bfd83f0f7a41d780910f245306fc570d68526bdbe0bb028
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82