Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
6f803ef93ff43f7ca1c58a4da0a93e0f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6f803ef93ff43f7ca1c58a4da0a93e0f.exe
Resource
win10v2004-20231215-en
General
-
Target
setup_installer.exe
-
Size
5.2MB
-
MD5
71e2cf4709767eab8e0e6dcd8f19d37c
-
SHA1
0641acedc06c13a17d94968e3237c4d9533fc0b9
-
SHA256
077ac4018bc25a85796c54e06872071d561df272188dde34daca7e5d01e950fd
-
SHA512
686cae3db08ad1c7beaf13758a74cae4eb4084d152be49510c11a13010cbb27a1407657fab57d0d732648e91e21862c0604a9ad789e55bcac803fc7be6b4b675
-
SSDEEP
98304:xwCvLUBsg6N9b/s7w39Zl+M0pVlFT77ekNZarbw8lsI4ZhQZX5ksdE9pvccJ2o3:xNLUCgM5k0vlSl8OZ6sI4ZipbEpvc02a
Malware Config
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
smokeloader
pub5
Extracted
redline
pub1
viacetequn.site:80
Extracted
nullmixer
http://hsiens.xyz/
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
CryptBot payload 3 IoCs
resource yara_rule behavioral4/memory/5108-226-0x0000000005A20000-0x0000000005AC3000-memory.dmp family_cryptbot behavioral4/memory/5108-227-0x0000000005A20000-0x0000000005AC3000-memory.dmp family_cryptbot behavioral4/memory/5108-228-0x0000000005A20000-0x0000000005AC3000-memory.dmp family_cryptbot -
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral4/files/0x000600000002320b-79.dat family_fabookie -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral4/memory/2480-90-0x0000000004A50000-0x0000000004A72000-memory.dmp family_redline behavioral4/memory/2480-114-0x0000000004C10000-0x0000000004C30000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral4/memory/2480-90-0x0000000004A50000-0x0000000004A72000-memory.dmp family_sectoprat behavioral4/memory/2480-114-0x0000000004C10000-0x0000000004C30000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 4 IoCs
resource yara_rule behavioral4/memory/848-99-0x00000000028E0000-0x000000000297D000-memory.dmp family_vidar behavioral4/memory/848-139-0x0000000000400000-0x00000000023F9000-memory.dmp family_vidar behavioral4/memory/848-186-0x0000000000400000-0x00000000023F9000-memory.dmp family_vidar behavioral4/memory/848-193-0x00000000028E0000-0x000000000297D000-memory.dmp family_vidar -
resource yara_rule behavioral4/files/0x0006000000023207-40.dat aspack_v212_v242 behavioral4/files/0x0007000000023202-41.dat aspack_v212_v242 behavioral4/files/0x0006000000023209-47.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation Mon000d7b2b59b9.exe -
Executes dropped EXE 13 IoCs
pid Process 2988 setup_install.exe 2196 Mon001af0f6251.exe 4908 Mon0015a1e17ea5.exe 4936 Mon00e8b91b250904.exe 4684 Mon000d7b2b59b9.exe 4036 Mon00271bbb5e.exe 2716 Mon0001207aa1161f.exe 2480 Mon00f61d292f523.exe 384 Mon00b1849cf0bf91e9.exe 848 Mon00a4b905d6fcf0a9.exe 3892 Mon000d7b2b59b9.exe 2204 Amica.exe.com 5108 Amica.exe.com -
Loads dropped DLL 6 IoCs
pid Process 2988 setup_install.exe 2988 setup_install.exe 2988 setup_install.exe 2988 setup_install.exe 2988 setup_install.exe 2988 setup_install.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Mon00b1849cf0bf91e9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1924 2988 WerFault.exe 86 1760 848 WerFault.exe 93 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon001af0f6251.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon001af0f6251.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon001af0f6251.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Amica.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Amica.exe.com -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2132 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2196 Mon001af0f6251.exe 2196 Mon001af0f6251.exe 4992 powershell.exe 4992 powershell.exe 4992 powershell.exe 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2196 Mon001af0f6251.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeDebugPrivilege 4908 Mon0015a1e17ea5.exe Token: SeDebugPrivilege 4936 Mon00e8b91b250904.exe Token: SeDebugPrivilege 4992 powershell.exe Token: SeDebugPrivilege 2480 Mon00f61d292f523.exe Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2204 Amica.exe.com 2204 Amica.exe.com 2204 Amica.exe.com 5108 Amica.exe.com 5108 Amica.exe.com 5108 Amica.exe.com 5108 Amica.exe.com 5108 Amica.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2204 Amica.exe.com 2204 Amica.exe.com 2204 Amica.exe.com 5108 Amica.exe.com 5108 Amica.exe.com 5108 Amica.exe.com -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3428 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2988 1716 setup_installer.exe 86 PID 1716 wrote to memory of 2988 1716 setup_installer.exe 86 PID 1716 wrote to memory of 2988 1716 setup_installer.exe 86 PID 2988 wrote to memory of 60 2988 setup_install.exe 111 PID 2988 wrote to memory of 60 2988 setup_install.exe 111 PID 2988 wrote to memory of 60 2988 setup_install.exe 111 PID 2988 wrote to memory of 1676 2988 setup_install.exe 110 PID 2988 wrote to memory of 1676 2988 setup_install.exe 110 PID 2988 wrote to memory of 1676 2988 setup_install.exe 110 PID 2988 wrote to memory of 1920 2988 setup_install.exe 109 PID 2988 wrote to memory of 1920 2988 setup_install.exe 109 PID 2988 wrote to memory of 1920 2988 setup_install.exe 109 PID 2988 wrote to memory of 4888 2988 setup_install.exe 108 PID 2988 wrote to memory of 4888 2988 setup_install.exe 108 PID 2988 wrote to memory of 4888 2988 setup_install.exe 108 PID 2988 wrote to memory of 4504 2988 setup_install.exe 107 PID 2988 wrote to memory of 4504 2988 setup_install.exe 107 PID 2988 wrote to memory of 4504 2988 setup_install.exe 107 PID 2988 wrote to memory of 4484 2988 setup_install.exe 106 PID 2988 wrote to memory of 4484 2988 setup_install.exe 106 PID 2988 wrote to memory of 4484 2988 setup_install.exe 106 PID 2988 wrote to memory of 4516 2988 setup_install.exe 105 PID 2988 wrote to memory of 4516 2988 setup_install.exe 105 PID 2988 wrote to memory of 4516 2988 setup_install.exe 105 PID 2988 wrote to memory of 4940 2988 setup_install.exe 104 PID 2988 wrote to memory of 4940 2988 setup_install.exe 104 PID 2988 wrote to memory of 4940 2988 setup_install.exe 104 PID 2988 wrote to memory of 4824 2988 setup_install.exe 103 PID 2988 wrote to memory of 4824 2988 setup_install.exe 103 PID 2988 wrote to memory of 4824 2988 setup_install.exe 103 PID 2988 wrote to memory of 1960 2988 setup_install.exe 102 PID 2988 wrote to memory of 1960 2988 setup_install.exe 102 PID 2988 wrote to memory of 1960 2988 setup_install.exe 102 PID 1920 wrote to memory of 2196 1920 cmd.exe 101 PID 1920 wrote to memory of 2196 1920 cmd.exe 101 PID 1920 wrote to memory of 2196 1920 cmd.exe 101 PID 1960 wrote to memory of 4908 1960 cmd.exe 100 PID 1960 wrote to memory of 4908 1960 cmd.exe 100 PID 4940 wrote to memory of 4936 4940 cmd.exe 89 PID 4940 wrote to memory of 4936 4940 cmd.exe 89 PID 1676 wrote to memory of 4684 1676 cmd.exe 99 PID 1676 wrote to memory of 4684 1676 cmd.exe 99 PID 1676 wrote to memory of 4684 1676 cmd.exe 99 PID 4516 wrote to memory of 4036 4516 cmd.exe 98 PID 4516 wrote to memory of 4036 4516 cmd.exe 98 PID 4516 wrote to memory of 4036 4516 cmd.exe 98 PID 4484 wrote to memory of 2480 4484 cmd.exe 97 PID 4484 wrote to memory of 2480 4484 cmd.exe 97 PID 4484 wrote to memory of 2480 4484 cmd.exe 97 PID 4824 wrote to memory of 384 4824 cmd.exe 96 PID 4824 wrote to memory of 384 4824 cmd.exe 96 PID 4824 wrote to memory of 384 4824 cmd.exe 96 PID 4888 wrote to memory of 2716 4888 cmd.exe 95 PID 4888 wrote to memory of 2716 4888 cmd.exe 95 PID 60 wrote to memory of 4992 60 cmd.exe 94 PID 60 wrote to memory of 4992 60 cmd.exe 94 PID 60 wrote to memory of 4992 60 cmd.exe 94 PID 4504 wrote to memory of 848 4504 cmd.exe 93 PID 4504 wrote to memory of 848 4504 cmd.exe 93 PID 4504 wrote to memory of 848 4504 cmd.exe 93 PID 384 wrote to memory of 3460 384 Mon00b1849cf0bf91e9.exe 112 PID 384 wrote to memory of 3460 384 Mon00b1849cf0bf91e9.exe 112 PID 384 wrote to memory of 3460 384 Mon00b1849cf0bf91e9.exe 112 PID 384 wrote to memory of 2880 384 Mon00b1849cf0bf91e9.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 4963⤵
- Program crash
PID:1924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon0015a1e17ea5.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00b1849cf0bf91e9.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00e8b91b250904.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00271bbb5e.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00f61d292f523.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00a4b905d6fcf0a9.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon0001207aa1161f.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon001af0f6251.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon000d7b2b59b9.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of WriteProcessMemory
PID:60
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00e8b91b250904.exeMon00e8b91b250904.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2988 -ip 29881⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00a4b905d6fcf0a9.exeMon00a4b905d6fcf0a9.exe1⤵
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 15242⤵
- Program crash
PID:1760
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon0001207aa1161f.exeMon0001207aa1161f.exe1⤵
- Executes dropped EXE
PID:2716
-
C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00b1849cf0bf91e9.exeMon00b1849cf0bf91e9.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe2⤵PID:3460
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Sfaldavano.xls2⤵PID:2880
-
C:\Windows\SysWOW64\cmd.execmd3⤵PID:3028
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^fARmmICHAETEVIAiewsqLILJhRoBwBFrurUNyycHHdHtUkLfezrMoLJHPojHmwGYYPnRONeXFJaxqGOwySnHnTVxzjYWSOiGKIutNTBfsuin$" Serravano.xls4⤵PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comAmica.exe.com Y4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5108
-
-
-
C:\Windows\SysWOW64\PING.EXEping EUCQOBEO -n 304⤵
- Runs ping.exe
PID:2132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00f61d292f523.exeMon00f61d292f523.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00271bbb5e.exeMon00271bbb5e.exe1⤵
- Executes dropped EXE
PID:4036
-
C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon000d7b2b59b9.exeMon000d7b2b59b9.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon000d7b2b59b9.exe"C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon000d7b2b59b9.exe" -a2⤵
- Executes dropped EXE
PID:3892
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon0015a1e17ea5.exeMon0015a1e17ea5.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon001af0f6251.exeMon001af0f6251.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 848 -ip 8481⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD557d883f2e96dccb2ca2867cb858151f8
SHA109e0fcd15cc69bcd6a9ef2928c4054d754b1aaa3
SHA256c1dc7829e850ff7189e993b6f2bd3b00d56f3ec062da364e8698fd39e79f0072
SHA5122235866e39dccc8cd524592f6f0b514878bf0c5ad13ee95bd01508766eb789528394bf329faee481d81e3fe389664fb5673d214d478cda58f4293bfe58ba4012
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
8KB
MD5408f2c9252ad66429a8d5401f1833db3
SHA13829d2d03a728ecd59b38cc189525220a60c05db
SHA256890db580fac738971bc7c714735ff6f1f2ee31edccd7881044da3e98452af664
SHA512d4c89dfd928023b9f4380808b27e032342d2a85963b95bbed3191cc03b455dbc6f5ffecf29828a53b1d9011b3881f1cda9d15d269a2cbcbd4be5c993bcd9643b
-
Filesize
236KB
MD57de877618ab2337aa32901030365b2ff
SHA1adb006662ec67e244d2d9c935460c656c3d47435
SHA256989079a8616a9e5c4f77c0e86b89d170dc7b8c4bf23768111f8e0d60e2c29da7
SHA512b7f9b402baad41e8e9df1db856b2273b64dd603b6c5bae147979fbff215af79b1d261cdd89f0eb050c7ef3db820bb0207decd58fbc7f9a8d4ffb179133a7c8ff
-
Filesize
1.5MB
MD5df80b76857b74ae1b2ada8efb2a730ee
SHA15653be57533c6eb058fed4963a25a676488ef832
SHA2565545c43eb14b0519ab997673efa379343f98d2b6b1578d9fdeb369234789f9dd
SHA512060b04536003ce4a91e5847d487701eed7e093408e427198be552f0af37aee498929586f3a0110c78173873a28d95c6c0a4cdd01c7218274f5849a4730f9efdd
-
Filesize
572KB
MD56dba60503ea60560826fe5a12dced3e9
SHA17bb04d508e970701dc2945ed42fe96dbb083ec33
SHA2568d49f82aaa8eb3dfa5c7d7dffd7efb9dd6b776ef08b8b8c5afc6cb8ab0743865
SHA512837c0f0dc70386ce1d143332e4d273750f64dd7f8be5b4ce79aa39628ceebf27d01e447ed0b9ec6064c6ba9dbaa13a64631c2e136ec99d27c0f4a25681053ff9
-
Filesize
1.5MB
MD55f0617b7287c5f217e89b9407284736e
SHA164db3f9ceedda486648db13b4ed87e868c9192ca
SHA256b0560993c8b7df45ede6031471dee138a335c428dd16454570ffa1b66175aa2a
SHA5126367d9f5749260b326328f2ca455cbb22fc4696f44e61fab7616e39471742afbce26b69ed3ffb27f4d9cad7b643a50b54aea5f33892f0422d331ca76b6ea05b9
-
Filesize
156KB
MD5cda12ae37191467d0a7d151664ed74aa
SHA12625b2e142c848092aa4a51584143ab7ed7d33d2
SHA2561e07bb767e9979d4afa4f8d69b68e33dd7c1a43f6863096a2b091047a10cdc2e
SHA51277c4429e22754e50828d9ec344cd63780acd31c350ef16ef69e2a396114df10e7c43d791440faee90e7f80be73e845ab579fd7b38efbd12f5de11bbc906f1c1d
-
Filesize
248KB
MD5d23c06e25b4bd295e821274472263572
SHA19ad295ec3853dc465ae77f9479f8c4f76e2748b8
SHA256f02c1351a8b3dc296cf815bb4cd2bcc2d25b3b9a258ab2ad95e8be3d9602322c
SHA512122b0ef44682f83651d81df622bbff5ad9fa0f5bbd6b925e35add9568825c0316c0f9921dac21cf92cb44658fc854f7829c01ae3b84aa0745929f8ef5e6ae1ae
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
2.1MB
MD5f69dc484a152f3e9f551fb34fbf15604
SHA1414ff10cdf2642172c0ec9cd28612a41facb95a9
SHA256031461d720fc1807aaf0ddb8410fc9cc7b154aac6f585f28d73ebf77d8093e82
SHA512ebb6a154d3b95be2d956ef738640709ecc56a80280adc32efcc029c844cf6aa97ef223b4b7602701358bc36fcac7af49ba37962aa5068a70b70b002e4a33013e
-
Filesize
439KB
MD5e5445cf8a9d9a17f51cb2480bfc3a12d
SHA1e3f0d449586d2de3cc5b99eb04ed68e6bf496f0b
SHA256b307f0113b0aab030c2d87abddbd47b85dab2fd9c6f2d4c94d2cfe2464ea1280
SHA5127a8c9c5d67ea077dfe6c002839188fdcba60844db18caecdc3a77f9f48b337800584f2c4dc694da0141e9271e31b18fca088cf15aea5e1baf81e48350c31a2cb
-
Filesize
320KB
MD51cc023fee6feb69a54dbfe330b07655b
SHA1a394b32233561e189bf42246b6391d38825fc933
SHA256f065da4ca2d1c98ebe3daaa2018c7451819aa20c7c97f49c0ae9ac1a0205b973
SHA512f714cec6c37e8d3f7b7d9b6b50006d1fce56936455a29423ed96912c30218a816f0f634e77df67ca895ab7394404d3476ce017452bdd84c51d86c9e106c63d61
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
438KB
MD53cbdfcc98cf6035e4dbbb9e2973408ac
SHA174109a53790d57a4f556e89d923e3b6e75750a7f
SHA2563eb1635551b5ba5a6da0c24fd53c29d377da2c483da9fe8ab1ab5d8ac7bb15bc
SHA5122ce5556baadf2a761205ea4bc0924d90735640c343dfa1a905436da86cbb9da0729684e0358e185cf9efdf2bedb138d942471f53fcf7458670deda8a118ee03c
-
Filesize
520KB
MD538ca87634efe105eb17cd2f5d66c3de0
SHA1644a5e08590a8542c47702dc358b2a2ba0134d15
SHA256c09c92bcb6e44cf033e547c73a28abcab0e314561f79840f30da42457ec25ca7
SHA512836f57853501e48690f79596db654b2efc6c89a3192ea72bd5f5ce618048406761df361c0717396c99e1e4f0536f686343a695f73adf9ddc7bdee70a5439ae94
-
Filesize
526B
MD526ebbe10f1e4b7581ee0137b3263c744
SHA17f5b7949216744cbe8cde40f8b4762224cce8cc0
SHA256376c16f256225ebadc257dab804c5bfbc1dde251a7aea7b55239d30261098495
SHA51248014f2f9de728f0d5af3b072a11552e798e6de07f86ed2ff6448b7ac3dbacf582801ee128a175d17df2be9e0d7c27caf6dc455b4b4f5786868567aa41a4f8ed
-
Filesize
195KB
MD5c74c9e2a517d576b12d14b458dd37fa1
SHA1232ae8fbc817142372c5000d78a2f32e6ef77db7
SHA256d66c3bcdada88f7ae7e39dafb74fa6bf5b6a95ddb7bdbde4ac3849a86b05ecca
SHA5128e4e5c9fe761bbb8dbc61b1408fd732a21420d6af563def839e69a8e911758a83fccd9f169fc847dd32aedc9e2da70bc74cf147368da0539f62a885e55667393
-
Filesize
259KB
MD59c4c0dd66d58cd672e5b7a889910c30a
SHA1d558da1bb91d239d519f0ed50ae9d9a9d16d0098
SHA2568dc6fd4fced04083ffea7d5d540d7d2424eabac6327b3cfe7c3c57fc7e89721e
SHA51228715832b39414ee08191d34bab9bd69028fd61edf43b4c874b32366ec4e36976c98f80d0a454993761d019c0f49519850b66f03a9cf965395fbe11639f25c87
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD553ce540d9420b471e08d69d3bea56151
SHA14693863dd34e99c72021f485eb759c04c59ce0cc
SHA256c525be399ce74fb62724e69e27a0e8bf3b8afd756a63dc0616d13eb6e0839192
SHA5127e285bc42c1fd2829f87ae84463f541778b6740c53a70cb62e6741295b65629985dba0d164c6603af65c37c8ffe4c8e9646d316052544acab8206914347a0b02
-
Filesize
1KB
MD5f1500a3c6b8e3d3459144b28066d97ba
SHA1e356c611b288daae7185f09bcae53cea1e79c000
SHA256fedcdd647acb5f53b9207bfc2ac562c4789421a9b9c29100806620c36021473b
SHA5129f60362ce97789577d15fc5f2b927f3a1fca101670df4b482aaf34ccca436538c20d425e2ade208e7c14bd328fdd34e09a0691eaeff6e7c0165cd5492a28ad30
-
Filesize
7KB
MD516815061e4a1c12749216ffcafe23688
SHA1b5d09451b645a8ea8393b7f1774dea0a61191ec8
SHA256a856fe724c363173eef4cdb31a921719e83d45129ad5097bdf411db8016b5548
SHA51226e94a9f3fdc42f243a96df1057daef28e8fe3c0f457fdf913bb707fe3d4c9413f5acd3cdc3e284b9dcb01b9674e2e38eb6d11dafa6675fadfd8e3b20b8cae38
-
Filesize
48KB
MD5ba993c4aac2c2b2b5b5e5ea35fbba707
SHA10c451901608ad94242ddd8ca95452d914aabfff4
SHA2563e39193bdfe7e67f12815322fd1caaacab440f6b24d1fd24be88b0182e31f206
SHA512e96eff44394b0cc310aeaa4309be5011b53e1fddb4791c2321f23180195404a7cd045ff51e44339f04c1298808c48e91cf62381490fd9365884444a25ab9e317
-
Filesize
42KB
MD5dbbfe9f3cc54de3c1e1300dc4ea25931
SHA1e73b56adb6007b8d831fc21d737fe2acecca584b
SHA2564fd8c2d4b25d065fb547f85d9f0204e4ffdc85f57b62916982d7e7986d5ee429
SHA5121d7d710489ac7e19131c305925ac5f2dc1b699f5c90688dbfb92207b6d2870a826d3b1d7c042774b704ff85fad4229086f697d292283816dd5700711326cd7c1
-
Filesize
1KB
MD5a28b938e8a6eb8aaaf9ec16bb3584d13
SHA1eb0cd4b236a35c357d647618a8177b460a568057
SHA2569e6dff9dd5c4263b7a81e6abc6a4338413a2b85fdc93e1451b0923637aa6485a
SHA512e7378dca2399a89b737f3a2a0cdf0c469013ad637bba60e108afc82527768d75190e957f8183bb17e645839501f7bc25065fd0face989e8d7f2942c78f7a68fa
-
Filesize
4KB
MD545e0f865d849541ed12a7b3c2688f875
SHA1a459077b85cf0ce698d575a6f802583f8d92438a
SHA25628d761ef7d4d02d0f71f6b4280eb94c302ee5b0218743138a0886390f51398da
SHA512836399156f939ec6cc54bdaee0c507fff6a0e0451251f1d9ed27b30f91dc239ca0c9559dfd79d220e4371f63a3ff1aac46da0b0bdd205fea7e203657195b85f7