Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 12:40
Static task
static1
Behavioral task
behavioral1
Sample
7244224914ec43925ee9d7281e863cdb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7244224914ec43925ee9d7281e863cdb.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20231215-en
General
-
Target
7244224914ec43925ee9d7281e863cdb.exe
-
Size
5.2MB
-
MD5
7244224914ec43925ee9d7281e863cdb
-
SHA1
16b1a51ff9009692177a3a73ef30f9a19b91dded
-
SHA256
c33789989d58fce9bbde8cdd23576c881b5ed0c329dce641567db6ad9f10a1ed
-
SHA512
a1b643eaf9d2c8e7a6eeb061eb8a22942cedbd71d1a45c2a8bad11a44dcd4936237b75d37f2a70a0f581c7966442ddc3925ec8ae18760d337e3de0fc1874d38e
-
SSDEEP
98304:yUsZpVV5etv2UpEsR4/iirdJoj1iiScW2LtboAclJTBsoGQ/6d+SKsF1n1SnFrtw:yUgVAv2fsR4airkigilhBLj/VsFN0nFa
Malware Config
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
smokeloader
pub5
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
nullmixer
http://hsiens.xyz/
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
redline
pub1
viacetequn.site:80
Signatures
-
CryptBot payload 3 IoCs
resource yara_rule behavioral2/memory/2692-250-0x0000000000490000-0x0000000000533000-memory.dmp family_cryptbot behavioral2/memory/2692-251-0x0000000000490000-0x0000000000533000-memory.dmp family_cryptbot behavioral2/memory/2692-252-0x0000000000490000-0x0000000000533000-memory.dmp family_cryptbot -
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral2/files/0x0006000000023154-76.dat family_fabookie -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/780-198-0x0000000004A50000-0x0000000004A72000-memory.dmp family_redline behavioral2/memory/780-207-0x0000000004DF0000-0x0000000004E10000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/780-198-0x0000000004A50000-0x0000000004A72000-memory.dmp family_sectoprat behavioral2/memory/780-207-0x0000000004DF0000-0x0000000004E10000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/856-115-0x00000000028B0000-0x000000000294D000-memory.dmp family_vidar behavioral2/memory/856-121-0x0000000000400000-0x00000000023F9000-memory.dmp family_vidar behavioral2/memory/856-170-0x0000000000400000-0x00000000023F9000-memory.dmp family_vidar behavioral2/memory/856-176-0x00000000028B0000-0x000000000294D000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x0007000000023149-59.dat aspack_v212_v242 behavioral2/files/0x000a000000023041-56.dat aspack_v212_v242 behavioral2/files/0x000a000000023042-54.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 7244224914ec43925ee9d7281e863cdb.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation Mon0073407dbaf4.exe -
Executes dropped EXE 17 IoCs
pid Process 2968 setup_installer.exe 5040 setup_install.exe 780 Mon00c04b224b6030608.exe 856 Mon0026809d87f.exe 3684 Mon0073407dbaf4.exe 740 Amica.exe.com 4252 Mon0079fda2128f31.exe 4920 Mon00dd025149a8874.exe 3408 Mon0064e6d9c4e87002f.exe 2184 Mon001c934f566cfee3.exe 4208 Mon00cb8e95f116ee.exe 3164 Mon0073407dbaf4.exe 4320 Amica.exe.com 4360 Amica.exe.com 740 Amica.exe.com 5008 Amica.exe.com 2692 Amica.exe.com -
Loads dropped DLL 5 IoCs
pid Process 5040 setup_install.exe 5040 setup_install.exe 5040 setup_install.exe 5040 setup_install.exe 5040 setup_install.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Mon001c934f566cfee3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4948 5040 WerFault.exe 91 3916 856 WerFault.exe 107 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon00dd025149a8874.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon00dd025149a8874.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon00dd025149a8874.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4024 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4920 Mon00dd025149a8874.exe 4920 Mon00dd025149a8874.exe 3176 powershell.exe 3176 powershell.exe 3176 powershell.exe 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4920 Mon00dd025149a8874.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3408 Mon0064e6d9c4e87002f.exe Token: SeDebugPrivilege 740 Amica.exe.com Token: SeDebugPrivilege 3176 powershell.exe Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeDebugPrivilege 780 Mon00c04b224b6030608.exe Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 4320 Amica.exe.com 3376 Process not Found 3376 Process not Found 4320 Amica.exe.com 4320 Amica.exe.com 3376 Process not Found 3376 Process not Found 4360 Amica.exe.com 3376 Process not Found 3376 Process not Found 4360 Amica.exe.com 4360 Amica.exe.com 3376 Process not Found 3376 Process not Found 740 Amica.exe.com 3376 Process not Found 3376 Process not Found 740 Amica.exe.com 740 Amica.exe.com 3376 Process not Found 3376 Process not Found 5008 Amica.exe.com 3376 Process not Found 3376 Process not Found 5008 Amica.exe.com 5008 Amica.exe.com 3376 Process not Found 3376 Process not Found 2692 Amica.exe.com 3376 Process not Found 3376 Process not Found 2692 Amica.exe.com 2692 Amica.exe.com 3376 Process not Found 3376 Process not Found -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 4320 Amica.exe.com 4320 Amica.exe.com 4320 Amica.exe.com 4360 Amica.exe.com 4360 Amica.exe.com 4360 Amica.exe.com 740 Amica.exe.com 740 Amica.exe.com 740 Amica.exe.com 5008 Amica.exe.com 5008 Amica.exe.com 5008 Amica.exe.com 2692 Amica.exe.com 2692 Amica.exe.com 2692 Amica.exe.com -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3376 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1572 wrote to memory of 2968 1572 7244224914ec43925ee9d7281e863cdb.exe 88 PID 1572 wrote to memory of 2968 1572 7244224914ec43925ee9d7281e863cdb.exe 88 PID 1572 wrote to memory of 2968 1572 7244224914ec43925ee9d7281e863cdb.exe 88 PID 2968 wrote to memory of 5040 2968 setup_installer.exe 91 PID 2968 wrote to memory of 5040 2968 setup_installer.exe 91 PID 2968 wrote to memory of 5040 2968 setup_installer.exe 91 PID 5040 wrote to memory of 1992 5040 setup_install.exe 96 PID 5040 wrote to memory of 1992 5040 setup_install.exe 96 PID 5040 wrote to memory of 1992 5040 setup_install.exe 96 PID 5040 wrote to memory of 1788 5040 setup_install.exe 97 PID 5040 wrote to memory of 1788 5040 setup_install.exe 97 PID 5040 wrote to memory of 1788 5040 setup_install.exe 97 PID 5040 wrote to memory of 2004 5040 setup_install.exe 98 PID 5040 wrote to memory of 2004 5040 setup_install.exe 98 PID 5040 wrote to memory of 2004 5040 setup_install.exe 98 PID 5040 wrote to memory of 3500 5040 setup_install.exe 105 PID 5040 wrote to memory of 3500 5040 setup_install.exe 105 PID 5040 wrote to memory of 3500 5040 setup_install.exe 105 PID 5040 wrote to memory of 4420 5040 setup_install.exe 104 PID 5040 wrote to memory of 4420 5040 setup_install.exe 104 PID 5040 wrote to memory of 4420 5040 setup_install.exe 104 PID 5040 wrote to memory of 532 5040 setup_install.exe 99 PID 5040 wrote to memory of 532 5040 setup_install.exe 99 PID 5040 wrote to memory of 532 5040 setup_install.exe 99 PID 5040 wrote to memory of 2408 5040 setup_install.exe 102 PID 5040 wrote to memory of 2408 5040 setup_install.exe 102 PID 5040 wrote to memory of 2408 5040 setup_install.exe 102 PID 5040 wrote to memory of 2416 5040 setup_install.exe 100 PID 5040 wrote to memory of 2416 5040 setup_install.exe 100 PID 5040 wrote to memory of 2416 5040 setup_install.exe 100 PID 5040 wrote to memory of 2428 5040 setup_install.exe 101 PID 5040 wrote to memory of 2428 5040 setup_install.exe 101 PID 5040 wrote to memory of 2428 5040 setup_install.exe 101 PID 5040 wrote to memory of 3088 5040 setup_install.exe 103 PID 5040 wrote to memory of 3088 5040 setup_install.exe 103 PID 5040 wrote to memory of 3088 5040 setup_install.exe 103 PID 532 wrote to memory of 780 532 cmd.exe 106 PID 532 wrote to memory of 780 532 cmd.exe 106 PID 532 wrote to memory of 780 532 cmd.exe 106 PID 4420 wrote to memory of 856 4420 cmd.exe 107 PID 4420 wrote to memory of 856 4420 cmd.exe 107 PID 4420 wrote to memory of 856 4420 cmd.exe 107 PID 1788 wrote to memory of 3684 1788 cmd.exe 108 PID 1788 wrote to memory of 3684 1788 cmd.exe 108 PID 1788 wrote to memory of 3684 1788 cmd.exe 108 PID 2416 wrote to memory of 740 2416 cmd.exe 135 PID 2416 wrote to memory of 740 2416 cmd.exe 135 PID 3500 wrote to memory of 4252 3500 cmd.exe 111 PID 3500 wrote to memory of 4252 3500 cmd.exe 111 PID 1992 wrote to memory of 3176 1992 cmd.exe 110 PID 1992 wrote to memory of 3176 1992 cmd.exe 110 PID 1992 wrote to memory of 3176 1992 cmd.exe 110 PID 2004 wrote to memory of 4920 2004 cmd.exe 112 PID 2004 wrote to memory of 4920 2004 cmd.exe 112 PID 2004 wrote to memory of 4920 2004 cmd.exe 112 PID 3088 wrote to memory of 3408 3088 cmd.exe 115 PID 3088 wrote to memory of 3408 3088 cmd.exe 115 PID 2428 wrote to memory of 2184 2428 cmd.exe 114 PID 2428 wrote to memory of 2184 2428 cmd.exe 114 PID 2428 wrote to memory of 2184 2428 cmd.exe 114 PID 2408 wrote to memory of 4208 2408 cmd.exe 113 PID 2408 wrote to memory of 4208 2408 cmd.exe 113 PID 2408 wrote to memory of 4208 2408 cmd.exe 113 PID 2184 wrote to memory of 3744 2184 Mon001c934f566cfee3.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7244224914ec43925ee9d7281e863cdb.exe"C:\Users\Admin\AppData\Local\Temp\7244224914ec43925ee9d7281e863cdb.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\7zS89BBA308\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS89BBA308\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon0073407dbaf4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\7zS89BBA308\Mon0073407dbaf4.exeMon0073407dbaf4.exe5⤵
- Checks computer location settings
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\7zS89BBA308\Mon0073407dbaf4.exe"C:\Users\Admin\AppData\Local\Temp\7zS89BBA308\Mon0073407dbaf4.exe" -a6⤵
- Executes dropped EXE
PID:3164
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00dd025149a8874.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\7zS89BBA308\Mon00dd025149a8874.exeMon00dd025149a8874.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00c04b224b6030608.exe4⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\7zS89BBA308\Mon00c04b224b6030608.exeMon00c04b224b6030608.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon003cfa9b5e9a3a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\7zS89BBA308\Mon003cfa9b5e9a3a.exeMon003cfa9b5e9a3a.exe5⤵PID:740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon001c934f566cfee3.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\7zS89BBA308\Mon001c934f566cfee3.exeMon001c934f566cfee3.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe6⤵PID:3744
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Sfaldavano.xls6⤵PID:4072
-
C:\Windows\SysWOW64\cmd.execmd7⤵PID:3464
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^fARmmICHAETEVIAiewsqLILJhRoBwBFrurUNyycHHdHtUkLfezrMoLJHPojHmwGYYPnRONeXFJaxqGOwySnHnTVxzjYWSOiGKIutNTBfsuin$" Serravano.xls8⤵PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comAmica.exe.com Y8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y11⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y12⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2692
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping NUPNSVML -n 308⤵
- Runs ping.exe
PID:4024
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00cb8e95f116ee.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\7zS89BBA308\Mon00cb8e95f116ee.exeMon00cb8e95f116ee.exe5⤵
- Executes dropped EXE
PID:4208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon0064e6d9c4e87002f.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\7zS89BBA308\Mon0064e6d9c4e87002f.exeMon0064e6d9c4e87002f.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon0026809d87f.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\7zS89BBA308\Mon0026809d87f.exeMon0026809d87f.exe5⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 10606⤵
- Program crash
PID:3916
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon0079fda2128f31.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\7zS89BBA308\Mon0079fda2128f31.exeMon0079fda2128f31.exe5⤵
- Executes dropped EXE
PID:4252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 4964⤵
- Program crash
PID:4948
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5040 -ip 50401⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 856 -ip 8561⤵PID:4784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD55f0617b7287c5f217e89b9407284736e
SHA164db3f9ceedda486648db13b4ed87e868c9192ca
SHA256b0560993c8b7df45ede6031471dee138a335c428dd16454570ffa1b66175aa2a
SHA5126367d9f5749260b326328f2ca455cbb22fc4696f44e61fab7616e39471742afbce26b69ed3ffb27f4d9cad7b643a50b54aea5f33892f0422d331ca76b6ea05b9
-
Filesize
572KB
MD56dba60503ea60560826fe5a12dced3e9
SHA17bb04d508e970701dc2945ed42fe96dbb083ec33
SHA2568d49f82aaa8eb3dfa5c7d7dffd7efb9dd6b776ef08b8b8c5afc6cb8ab0743865
SHA512837c0f0dc70386ce1d143332e4d273750f64dd7f8be5b4ce79aa39628ceebf27d01e447ed0b9ec6064c6ba9dbaa13a64631c2e136ec99d27c0f4a25681053ff9
-
Filesize
156KB
MD5cda12ae37191467d0a7d151664ed74aa
SHA12625b2e142c848092aa4a51584143ab7ed7d33d2
SHA2561e07bb767e9979d4afa4f8d69b68e33dd7c1a43f6863096a2b091047a10cdc2e
SHA51277c4429e22754e50828d9ec344cd63780acd31c350ef16ef69e2a396114df10e7c43d791440faee90e7f80be73e845ab579fd7b38efbd12f5de11bbc906f1c1d
-
Filesize
8KB
MD5408f2c9252ad66429a8d5401f1833db3
SHA13829d2d03a728ecd59b38cc189525220a60c05db
SHA256890db580fac738971bc7c714735ff6f1f2ee31edccd7881044da3e98452af664
SHA512d4c89dfd928023b9f4380808b27e032342d2a85963b95bbed3191cc03b455dbc6f5ffecf29828a53b1d9011b3881f1cda9d15d269a2cbcbd4be5c993bcd9643b
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
1.3MB
MD557d883f2e96dccb2ca2867cb858151f8
SHA109e0fcd15cc69bcd6a9ef2928c4054d754b1aaa3
SHA256c1dc7829e850ff7189e993b6f2bd3b00d56f3ec062da364e8698fd39e79f0072
SHA5122235866e39dccc8cd524592f6f0b514878bf0c5ad13ee95bd01508766eb789528394bf329faee481d81e3fe389664fb5673d214d478cda58f4293bfe58ba4012
-
Filesize
248KB
MD5d23c06e25b4bd295e821274472263572
SHA19ad295ec3853dc465ae77f9479f8c4f76e2748b8
SHA256f02c1351a8b3dc296cf815bb4cd2bcc2d25b3b9a258ab2ad95e8be3d9602322c
SHA512122b0ef44682f83651d81df622bbff5ad9fa0f5bbd6b925e35add9568825c0316c0f9921dac21cf92cb44658fc854f7829c01ae3b84aa0745929f8ef5e6ae1ae
-
Filesize
1.5MB
MD5df80b76857b74ae1b2ada8efb2a730ee
SHA15653be57533c6eb058fed4963a25a676488ef832
SHA2565545c43eb14b0519ab997673efa379343f98d2b6b1578d9fdeb369234789f9dd
SHA512060b04536003ce4a91e5847d487701eed7e093408e427198be552f0af37aee498929586f3a0110c78173873a28d95c6c0a4cdd01c7218274f5849a4730f9efdd
-
Filesize
236KB
MD57de877618ab2337aa32901030365b2ff
SHA1adb006662ec67e244d2d9c935460c656c3d47435
SHA256989079a8616a9e5c4f77c0e86b89d170dc7b8c4bf23768111f8e0d60e2c29da7
SHA512b7f9b402baad41e8e9df1db856b2273b64dd603b6c5bae147979fbff215af79b1d261cdd89f0eb050c7ef3db820bb0207decd58fbc7f9a8d4ffb179133a7c8ff
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
2.1MB
MD50062696453056d114ad5a5c392c6b05c
SHA140e8a58d4f0c75fd1840cb44cb45aa7068a21d73
SHA2568d35902fd4f9662d6582dcfc96c8235fd94160620b414ad803cd7a7d7d5a1766
SHA51235e210211db9c9725a3adc89e211960287d01f3fb3d959a2b49dde3fcd85f8d4f25e6dd4ac78135bd46edf4722c40d41169f39b0548d2fc54c3a32c019a7be26
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
576KB
MD5160c2185bdd0537a2a2ec1159db8748c
SHA1c3b754d14bb709aa3b7283d3cccfae8db32e67ae
SHA25659bb7dab226ccd20edfc5f580049a2000a60a0e189c4aee68075a28955591234
SHA512420e3948f8efd16950c12dda6cad31475f7e4800c91f1f6be33c5143937ff10ba89bb4cbf801001f01604b4c6df6f0a96a52607b14485973d6357a82f65d8d7f
-
Filesize
882KB
MD5890c973b9a423247c7b86a08afbe4c72
SHA164f7b204ca243b824b5c6dbe06e15293a22220ed
SHA25694a77409b420387daab07e7475fe2dc25e62c3793c5fdd04b304bb378ce95280
SHA51251ecc4e1b547323e2cae3bdbd5ca341afa3550f819f02fc691bb0737ebbd79b6594fdf637654bb2ebae35b4811caa78d52d72403a0ab5989c0217dd7b6589913
-
Filesize
872KB
MD5bb57f693db1599698d76a13dcb0c9667
SHA14992bca0f7f057b6d367e8c3bd81bb58c1a8777c
SHA256ee03c7b20e7c8eeef401ee2a7de867e8a151d4472c9947cde7f21d011f5196a8
SHA512cf8b2252ba7787312c0e8f72a68ff05dbb23582263c11e66959cd6a7f25cde25e9a33b5078f5cc8840554edc3d6c0b3e7229ba0e8727799e29b128f560cfd950
-
Filesize
526B
MD526ebbe10f1e4b7581ee0137b3263c744
SHA17f5b7949216744cbe8cde40f8b4762224cce8cc0
SHA256376c16f256225ebadc257dab804c5bfbc1dde251a7aea7b55239d30261098495
SHA51248014f2f9de728f0d5af3b072a11552e798e6de07f86ed2ff6448b7ac3dbacf582801ee128a175d17df2be9e0d7c27caf6dc455b4b4f5786868567aa41a4f8ed
-
Filesize
634KB
MD54443fb1498a509fba5ab839259dc89e2
SHA13214b5261c6389387666d9ed5640d145109f0b88
SHA256a120b3e85f1209aea39a8c94e92f97b3ceb3fdf4578accc2cda157a7dcc22735
SHA5126bf52a1c060355fdc9cb4676cdb61fd5556e424b2dd49d872b9528e2e6c556c8c24ae608ed38e66526b38b4d5c4bacbba957634a93f2982c8cc120a0259b24e9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.2MB
MD552185d08fdcc8452577760cba1a8c9bf
SHA14865c1c006cb8647463093a5a99953a4dfc2f4d4
SHA25604328f6c08f6c49f2e32b80285e1fb2c9c4849b53bbfd09b815c643b46f33f78
SHA51237d8b9f699a630413716570770204bfc4699441d40e2caf376182d713a429078310555b04429bfaccc7906ade9332c3a704111e5597cd94a2ea85acafded55df