Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
8d67e92d16bcb3f33a3114e14474fa58.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d67e92d16bcb3f33a3114e14474fa58.exe
Resource
win10v2004-20231222-en
General
-
Target
8d67e92d16bcb3f33a3114e14474fa58.exe
-
Size
4.2MB
-
MD5
8d67e92d16bcb3f33a3114e14474fa58
-
SHA1
f3d0417dc639ca4fd7a22c07fb9dd3f5bd6cdc01
-
SHA256
23d27e3d7908bb0d08b3575d443036dc91aa2c390b170e0e2d8c5ab0dc054078
-
SHA512
a2f12d64ae93942ea4bf5f80fc9cf75739f2e0877e01ce26a35c2e5398c5664efea99e0f84cd9a2ae1b27f511648c0957618d19a7eda3ba88f3bfb111baa6125
-
SSDEEP
98304:yAZS8sVrh+5/NqFq/0afVxWRy10WJtl+gZKnexVw5y/PoIpUpda:yANstA5/0FqrzdJKneN/P75
Malware Config
Extracted
nullmixer
http://marisana.xyz/
Extracted
redline
pab3
185.215.113.15:61506
Extracted
smokeloader
pub6
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/4020-116-0x0000000004C50000-0x0000000004C72000-memory.dmp family_redline behavioral2/memory/4020-118-0x0000000004CC0000-0x0000000004CE0000-memory.dmp family_redline -
SectopRAT payload 4 IoCs
resource yara_rule behavioral2/memory/4020-116-0x0000000004C50000-0x0000000004C72000-memory.dmp family_sectoprat behavioral2/memory/4020-118-0x0000000004CC0000-0x0000000004CE0000-memory.dmp family_sectoprat behavioral2/memory/4020-132-0x0000000007500000-0x0000000007510000-memory.dmp family_sectoprat behavioral2/memory/4020-208-0x0000000007500000-0x0000000007510000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/1472-161-0x0000000004870000-0x000000000490D000-memory.dmp family_vidar behavioral2/memory/1472-163-0x0000000000400000-0x0000000002D1A000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x000600000002321e-53.dat aspack_v212_v242 behavioral2/files/0x000600000002321d-61.dat aspack_v212_v242 behavioral2/files/0x0006000000023220-60.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 8d67e92d16bcb3f33a3114e14474fa58.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Mon201e749cce13219c.exe -
Executes dropped EXE 14 IoCs
pid Process 4972 WerFault.exe 4692 setup_install.exe 4748 Mon20bd1069e0a1.exe 944 Mon20b1a4b518b89f.exe 1036 Mon201e749cce13219c.exe 3884 Mon2008ca219fb.exe 4828 Mon20bd52299e9f784e5.exe 1576 Mon20e066a4a15d1287.exe 1472 Mon20a820a0da875e5a5.exe 4020 Mon20d164ee15b14251.exe 2228 Mon2028cde87b.exe 1888 Mon201e749cce13219c.exe 4936 Talune.exe.com 1292 Talune.exe.com -
Loads dropped DLL 6 IoCs
pid Process 4692 setup_install.exe 4692 setup_install.exe 4692 setup_install.exe 4692 setup_install.exe 4692 setup_install.exe 4692 setup_install.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Mon20e066a4a15d1287.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 16 iplogger.org 14 iplogger.org 15 iplogger.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 13 IoCs
pid pid_target Process procid_target 3880 4692 WerFault.exe 85 216 1472 WerFault.exe 103 4288 1472 WerFault.exe 103 2536 1472 WerFault.exe 103 3844 1472 WerFault.exe 103 4340 1472 WerFault.exe 103 2304 1472 WerFault.exe 103 3560 1472 WerFault.exe 103 4868 1472 WerFault.exe 103 4900 1472 WerFault.exe 103 2296 944 WerFault.exe 91 2268 1472 WerFault.exe 103 4624 1472 WerFault.exe 103 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon20b1a4b518b89f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon20b1a4b518b89f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon20b1a4b518b89f.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3044 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2372 powershell.exe 2372 powershell.exe 944 Mon20b1a4b518b89f.exe 944 Mon20b1a4b518b89f.exe 2372 powershell.exe 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found 3652 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 944 Mon20b1a4b518b89f.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 3884 Mon2008ca219fb.exe Token: SeDebugPrivilege 4828 Mon20bd52299e9f784e5.exe Token: SeDebugPrivilege 2372 powershell.exe Token: SeDebugPrivilege 4020 Mon20d164ee15b14251.exe Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found Token: SeShutdownPrivilege 3652 Process not Found Token: SeCreatePagefilePrivilege 3652 Process not Found -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 4936 Talune.exe.com 4936 Talune.exe.com 4936 Talune.exe.com 1292 Talune.exe.com 1292 Talune.exe.com 1292 Talune.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 4936 Talune.exe.com 4936 Talune.exe.com 4936 Talune.exe.com 1292 Talune.exe.com 1292 Talune.exe.com 1292 Talune.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4972 4936 8d67e92d16bcb3f33a3114e14474fa58.exe 84 PID 4936 wrote to memory of 4972 4936 8d67e92d16bcb3f33a3114e14474fa58.exe 84 PID 4936 wrote to memory of 4972 4936 8d67e92d16bcb3f33a3114e14474fa58.exe 84 PID 4972 wrote to memory of 4692 4972 WerFault.exe 85 PID 4972 wrote to memory of 4692 4972 WerFault.exe 85 PID 4972 wrote to memory of 4692 4972 WerFault.exe 85 PID 4692 wrote to memory of 760 4692 setup_install.exe 120 PID 4692 wrote to memory of 760 4692 setup_install.exe 120 PID 4692 wrote to memory of 760 4692 setup_install.exe 120 PID 4692 wrote to memory of 5008 4692 setup_install.exe 88 PID 4692 wrote to memory of 5008 4692 setup_install.exe 88 PID 4692 wrote to memory of 5008 4692 setup_install.exe 88 PID 4692 wrote to memory of 4480 4692 setup_install.exe 119 PID 4692 wrote to memory of 4480 4692 setup_install.exe 119 PID 4692 wrote to memory of 4480 4692 setup_install.exe 119 PID 4692 wrote to memory of 2100 4692 setup_install.exe 118 PID 4692 wrote to memory of 2100 4692 setup_install.exe 118 PID 4692 wrote to memory of 2100 4692 setup_install.exe 118 PID 4692 wrote to memory of 4572 4692 setup_install.exe 117 PID 4692 wrote to memory of 4572 4692 setup_install.exe 117 PID 4692 wrote to memory of 4572 4692 setup_install.exe 117 PID 4692 wrote to memory of 4336 4692 setup_install.exe 111 PID 4692 wrote to memory of 4336 4692 setup_install.exe 111 PID 4692 wrote to memory of 4336 4692 setup_install.exe 111 PID 4692 wrote to memory of 2272 4692 setup_install.exe 110 PID 4692 wrote to memory of 2272 4692 setup_install.exe 110 PID 4692 wrote to memory of 2272 4692 setup_install.exe 110 PID 4692 wrote to memory of 2268 4692 setup_install.exe 143 PID 4692 wrote to memory of 2268 4692 setup_install.exe 143 PID 4692 wrote to memory of 2268 4692 setup_install.exe 143 PID 4692 wrote to memory of 4660 4692 setup_install.exe 108 PID 4692 wrote to memory of 4660 4692 setup_install.exe 108 PID 4692 wrote to memory of 4660 4692 setup_install.exe 108 PID 4692 wrote to memory of 3204 4692 setup_install.exe 89 PID 4692 wrote to memory of 3204 4692 setup_install.exe 89 PID 4692 wrote to memory of 3204 4692 setup_install.exe 89 PID 760 wrote to memory of 2372 760 cmd.exe 90 PID 760 wrote to memory of 2372 760 cmd.exe 90 PID 760 wrote to memory of 2372 760 cmd.exe 90 PID 5008 wrote to memory of 1036 5008 cmd.exe 107 PID 5008 wrote to memory of 1036 5008 cmd.exe 107 PID 5008 wrote to memory of 1036 5008 cmd.exe 107 PID 4480 wrote to memory of 944 4480 cmd.exe 91 PID 4480 wrote to memory of 944 4480 cmd.exe 91 PID 4480 wrote to memory of 944 4480 cmd.exe 91 PID 2100 wrote to memory of 4748 2100 cmd.exe 106 PID 2100 wrote to memory of 4748 2100 cmd.exe 106 PID 2268 wrote to memory of 4828 2268 WerFault.exe 105 PID 2268 wrote to memory of 4828 2268 WerFault.exe 105 PID 3204 wrote to memory of 3884 3204 cmd.exe 96 PID 3204 wrote to memory of 3884 3204 cmd.exe 96 PID 4660 wrote to memory of 1576 4660 cmd.exe 104 PID 4660 wrote to memory of 1576 4660 cmd.exe 104 PID 4660 wrote to memory of 1576 4660 cmd.exe 104 PID 4572 wrote to memory of 1472 4572 cmd.exe 103 PID 4572 wrote to memory of 1472 4572 cmd.exe 103 PID 4572 wrote to memory of 1472 4572 cmd.exe 103 PID 4336 wrote to memory of 4020 4336 cmd.exe 95 PID 4336 wrote to memory of 4020 4336 cmd.exe 95 PID 4336 wrote to memory of 4020 4336 cmd.exe 95 PID 2272 wrote to memory of 2228 2272 cmd.exe 92 PID 2272 wrote to memory of 2228 2272 cmd.exe 92 PID 2272 wrote to memory of 2228 2272 cmd.exe 92 PID 1576 wrote to memory of 3844 1576 Mon20e066a4a15d1287.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d67e92d16bcb3f33a3114e14474fa58.exe"C:\Users\Admin\AppData\Local\Temp\8d67e92d16bcb3f33a3114e14474fa58.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\7zSC6373B67\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSC6373B67\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon201e749cce13219c.exe4⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\7zSC6373B67\Mon201e749cce13219c.exeMon201e749cce13219c.exe5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon2008ca219fb.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\7zSC6373B67\Mon2008ca219fb.exeMon2008ca219fb.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 5004⤵
- Program crash
PID:3880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20e066a4a15d1287.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20bd52299e9f784e5.exe4⤵PID:2268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon2028cde87b.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20d164ee15b14251.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20a820a0da875e5a5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20bd1069e0a1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20b1a4b518b89f.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:760
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
C:\Users\Admin\AppData\Local\Temp\7zSC6373B67\Mon20b1a4b518b89f.exeMon20b1a4b518b89f.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 3722⤵
- Program crash
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC6373B67\Mon2028cde87b.exeMon2028cde87b.exe1⤵
- Executes dropped EXE
PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4692 -ip 46921⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\7zSC6373B67\Mon20d164ee15b14251.exeMon20d164ee15b14251.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
C:\Windows\SysWOW64\dllhost.exedllhost.exe1⤵PID:3844
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Conservava.xlam1⤵PID:3740
-
C:\Windows\SysWOW64\cmd.execmd2⤵PID:2184
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^aXXPLdOdpKvHEwwcALYIInWmgGDtBFsVVodqfjpjFmFfheNjFpLslXxTwbAyMJPDzALcKwugCMepSGkjSsms$" Suoi.xlam3⤵PID:5088
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.comTalune.exe.com K3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.com K4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1292
-
-
-
C:\Windows\SysWOW64\PING.EXEping ZHCNTALV -n 303⤵
- Runs ping.exe
PID:3044
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC6373B67\Mon201e749cce13219c.exe"C:\Users\Admin\AppData\Local\Temp\7zSC6373B67\Mon201e749cce13219c.exe" -a1⤵
- Executes dropped EXE
PID:1888
-
C:\Users\Admin\AppData\Local\Temp\7zSC6373B67\Mon20a820a0da875e5a5.exeMon20a820a0da875e5a5.exe1⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 8322⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 8402⤵
- Program crash
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 8762⤵
- Program crash
PID:2536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 8962⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 9922⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 10082⤵
- Program crash
PID:2304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 11042⤵
- Program crash
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 15482⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 15562⤵
- Program crash
PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 16882⤵
- Program crash
- Suspicious use of WriteProcessMemory
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 16922⤵
- Program crash
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC6373B67\Mon20e066a4a15d1287.exeMon20e066a4a15d1287.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1576
-
C:\Users\Admin\AppData\Local\Temp\7zSC6373B67\Mon20bd52299e9f784e5.exeMon20bd52299e9f784e5.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
C:\Users\Admin\AppData\Local\Temp\7zSC6373B67\Mon20bd1069e0a1.exeMon20bd1069e0a1.exe1⤵
- Executes dropped EXE
PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1472 -ip 14721⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1472 -ip 14721⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1472 -ip 14721⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1472 -ip 14721⤵PID:976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1472 -ip 14721⤵PID:3684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1472 -ip 14721⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1472 -ip 14721⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1472 -ip 14721⤵PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1472 -ip 14721⤵PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1472 -ip 14721⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1472 -ip 14721⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 944 -ip 9441⤵PID:1684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1472 -ip 14721⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1472 -ip 14721⤵PID:3340
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5ce3a49b916b81a7d349c0f8c9f283d34
SHA1a04ea42670fcf09fffbf7f4d4ac9c8e3edfc8cf4
SHA2569a1f1a9f448d94c8954b8004a4ff3e8405f8b18139f95d04f8d9b40c483e1b40
SHA512e7e0150f3c79300c4e11ca391de9553440846c4b9594b49d8854769a347deb4ba10d5f7d3e7684e3a942ff15b61484910adc12014495adef68eaeb98f887ed80
-
Filesize
56KB
MD53263859df4866bf393d46f06f331a08f
SHA15b4665de13c9727a502f4d11afb800b075929d6c
SHA2569dcacda3913e30cafd92c909648b5bffde14b8e39e6adbfb15628006c0d4d3c2
SHA51258205110a017f5d73dd131fefb1e3bbbcc670ed0c645aeefebe5281579c7b1dceffa56671cd7b186554bdb81710e21018ed0d7088a27517dfc5e48d6d3578cf6
-
Filesize
631KB
MD564be7ccaa252abfd99ecf77bc8cce4d5
SHA19a9633c3cd6b394d149982021e008da3ceb64be0
SHA256d9e8d0bdac5bc0b2a4958536474496fcaaf964d135cd1fe49d1e566b6640199c
SHA512392782e14a78c1c157ee2935990805b13e0db39cd7629be7c880fe05c078c36a5807fb36e70320e6997399be88e85b8c51272fa51a48863bf2ea99c669e32de2
-
Filesize
333KB
MD5a3fdcd5e256068bbdc01bcc0926d2711
SHA1b31195f38f074fd3348648c4aa6a3ed43797edec
SHA256fb28e7d9aba374251d3ed1ba976446f6ffaa25de211edebd67bf7819a6226ed8
SHA5121b6ab427ecb728dd24e37f9fccb177cee26bcd18507f34fe720a844b62fb5d8d7a36995e9790be7ed5940bed3ac891a9387466f8afefa407eff4be0d58ca859c
-
Filesize
557KB
MD5e8dd2c2b42ddc701b1e2c34cc1fe99b1
SHA1c3751581986d6cada60747843792d286fd671657
SHA256835443a1038ad5e0a4dde2451baa95b529f049362955d57daf0b5921729a4f17
SHA512e179b3b4c2f24d089566630c6ee0421418fe17aa4195dc9b04f471665094ce3a4b3ed29da7b6829b7484fa3e785abd343a1cf7abc556f6f5b5403a92b16a970d
-
Filesize
417KB
MD5de63d916192b9a4c82be2fa5b02c366b
SHA1387c31272208c7431d035d29d57ef2373e16ea80
SHA256ff1594e897e87b958cc8f5553b6857076d7c7708f94e520d43f109ef9adfc66d
SHA5121fbaffebc643529fd71874a16c4b3eebd37a253858f39927b928712c1c62eae2e8ff6d750dd7ddd70a4723240ecc8053765e4e2699328c999c4815471222e449
-
Filesize
189KB
MD5aaa920633b44d1df8480d308da98529f
SHA154ba9f7c1d9df76d182f896d1932adc0de7159d2
SHA2565470f015df95f647b3064b2dfc67b6689a5e63e73812dbbf8971b7a05d798f4d
SHA5120f8c82e3c0bca2fb95552ae38bf6eeaa920a426d9e08f6997ed3fbce4b5a1936bb102c23e7c52d4083700b56f971a9098856241cd70065e24d90f8c7ac16c1d2
-
Filesize
241KB
MD55866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
Filesize
124KB
MD59996968bf823f79bb6cd767642974947
SHA151ec008918335b895fb8fecb186dec0dacdd64d8
SHA256252a203815e00302d4eda7c66b0432494adfaadd555859ee89ca775dc013fe76
SHA5124cc7d0ec1572d5a8a72b714018402c90028dc194ce2919295cf9b726848e80824a45c5a241f1f2d0532be1e953a184aecf2e05430361d3a2f399c37cc92bd72e
-
Filesize
279KB
MD5af23965c3e2673940b70f436bb45f766
SHA1ccc8b03ea8c568f1b333458cff3f156898fc29f7
SHA256e6271d738fc78602abc8916fb4742638b2b4c4205882f6db24eb361694c67503
SHA512f0202e3ed32b9e69785bb50551b5143fe69298dead3c9a3d539cc6c6768f70f8263f074f912d1de5decb122bc365b7645428c0d10040f6f15a41f3a5ac0a4611
-
Filesize
407KB
MD5bccf0ab0bfa962ce1f6b2007ecfc16b7
SHA19f5c1c72d4c2e10169260c175912ca0d296a66b9
SHA2562661f233157959620f7c31c411431fb9a394d0e06a7ce5f76332571a0950af8b
SHA512bcb320a57132aa092cebfef9a1fcc78082a2a8dd8541921a61129b25e93447f9e32cb9995bd0edbcad73be06777d8e6c1edd75a77a4b59d79e162e7fa69a4a35
-
Filesize
335KB
MD58f2f0e74056fde78f83e36704fed97ea
SHA1351645ef6c40f973acf6bc045c5d5e3c50e78b54
SHA2567a0fd03f9e6d5b79ab991f6239fda984bd4e5b3775fdf0fd4402175263313926
SHA512e2a5b35545a11380a14f14930b6cc0560a2a9503a4cda418f83c788ff1fe1a71f887ba473506302b21587bf2e9d1f1c1735a0dda28d8b06dd91c3afd4e9ee1b1
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
773KB
MD507045ddc06677b1a48b935d155424285
SHA10bcd96c99717f15352947cdd530b07109f1a164c
SHA256b495c05c867441bff8f97db405732c74edf7e61247acc85e33e35ed2105fb154
SHA512a2fc1e3f628dd02bb252ac397a7a09232c8546c9632cd2c4da45a5bad10d36bcac504fbd91fe4d9f8c6234a66baeb6d43877133efddb3b3c8d4ea93cee6145bf
-
Filesize
664KB
MD52477181e22181561705ec13c87c89aae
SHA1b5a4331f116ecd744d0c8116f9d50616c6488bdb
SHA25681ee6fbbff70186be6ce37f840d4f219f0ea70bc2aa790c3265c2dc133127729
SHA5124e2250188bfb07e7ce63689000bc05b3f6f663b959641ddec5b34163292602dff4ba886b0f33993d9ebcae68c48ce19265360fab48441bd2a715bffb0370cc98
-
Filesize
562KB
MD55d63556ff4999690b6be0bab2de801e6
SHA1375273e0f588f4ad64e749931e2cb302ce01fac5
SHA2566e40cdc87e91db8bf50aa08b21603774adcc2a42c2203c08da8960ac3fa14bd5
SHA51252c7780437d3e83858ba739f059eae98754367a3b0191f13dbd2e1d9f1e83bf13a8c37f9b455651b821c51f62597ed03727552a02891360b963cb51c5b5113b7
-
Filesize
100KB
MD5d3cd6c617bcf03d619e5ee3609c6085b
SHA1bdd9f6004be918d15b15ff1557e4ab9e6758ec88
SHA256a266b95d5c1f2c7047d795372a94a58815763b700e2d30d43b33b776a8c9e43c
SHA512c62444ac76be9dea98535b907757dc0263794e5fa64605b7c27ee3bf966bc311d8334b7ce6c55bd0e8db6212e8684b70bd54bc84b0d37be7b8d11b36a80fb6e9
-
Filesize
439B
MD567db09870ad0361cb90cfcceffe5c87c
SHA13d5071241bc942beab03782aabd90e2618fac1df
SHA256455e2f47d0fbeee0f9e5b5ea7b51ce923d85fb98ba46572ccf6740814fa524a0
SHA5121f0d712bf99001a38d3c7af42ca0a6ab226660b18f422963305aef35e33064ad43949eb9b516f3c3efdf8bf4b7bd5e5f8d02baebd3762f79fbdf3850ffc879cb
-
Filesize
149KB
MD567e1fb728e7b423a9580ff3e5559289c
SHA14334efd4114ad9aa72682ba1d6d862748ce489c9
SHA2560385da7fd698f92284bb857e21bf5142f485a30d7fe1319d316b4a1081d6f6e0
SHA5127e4bb8591f4e6e554a640a36d3768ac960b06eab16f58839ecd6d50a0d96c985b806ddfd4ec244cfbbd89dbdbc4eaacf7bfcc9cec2abafb00b91d6099fdf8de5
-
Filesize
141KB
MD57518156f92ff06ffcf2c6509edb5319e
SHA1b0801ec5a7335a3f4785250de06fce6d62b7f176
SHA256d5c8bb7b2f6b1473848aabb1a3052b0fb70bd82065ef10855a8a24d0b1498731
SHA512aff63b47afed87f1663736e8de636b10a4ad74041b62d38586f5e5ebff3fe8b586b7515d7a5b28b7a0098f23bec039ac0a2b5cdfedfd57a24bde99cb0ed2e569
-
Filesize
174KB
MD512c71bf402720a6a14a52d748765f1ee
SHA1a8bad87532d453a35b476018dd6d8eeefbee950f
SHA25649fe6bfb0761237dac80590825ea77dffe78f5bbc6686406e8496565303438c1
SHA512f712fd3f389575c4a98d623eec2a22bf73686f4691c58957fdd4117a7a8cfeb268af696325637336d14a601c332652f6c3f286ea18033de8ac0a074820bd14d4
-
Filesize
270KB
MD5bb95a3921b402ac52676a3715ef719f5
SHA19a067e81caa50522fd05a17894423bd5199e88f7
SHA25670863e212e43d4c8bf3fce0a8780c82a15b30dd8f1ecc16e3da5ccfdb43f8776
SHA512513330a91eb5b6bf68a4aa8c3a782627bf9fc8900e9797523e22844d3e4dcaf9b2ec76372f988b1d9af22378e5a26e574b9baa1c8eed2c117bc41859b0d17b9f
-
Filesize
84KB
MD5e08bfd4a65e4a957cd6260dc40dc02c6
SHA17b46c5e70175c04cba0113451b0eb6ede5abbc83
SHA2561645efba528c2d80557af055bdf90580d5d1b999f39d8e4b747fe0a8949ae3d6
SHA512171d20fc84b87b7458cf1dc6734d8d928c880fdc245dd43b23fbab0babaa3f4488de820d55e79e982b8dde20a350ecd0650e8880e19834ec5dce9335ed26075c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.1MB
MD5217368eb29e36bef8e12075b835922c4
SHA17a97984d41c0d5e806341503f35d99aed1b40492
SHA2569fed334089b1d9174929b7d0658b37f026eead0eedb93e6a818533e26596790d
SHA512049d6ee395b2d166ffe0f450efa14887b5714524420ab6a6ca97c5932b530f834cb5f0d217d05c293906dfa05ed43ac5f46a3f7520cee9ff995c7150a0ecb8c8
-
Filesize
858KB
MD51c9d3d94372f6e3e95f77e7bb21abbd9
SHA11544953f028aae7b2993c5daf4f3327bc01189db
SHA256299e7bd5679d30429c0f9f79a1faca61c06d92f14ce897d7b89118026956408e
SHA5128ae616fd6312893a5623f813a293ff9830e67418e21cf05332d1ea81b0b37f64e96ae323ab3b6771e3cc650f9d68372d0de0ec06fe49b722d07d766c17872d85
-
Filesize
2.4MB
MD57b8a7232ca7806ba493d1e68236a10fe
SHA10644194b33fff20e77952186f4b820006be6b70d
SHA256bdf7b03dcb6b93416c7e9f545dad066d9426dcd50a0336dd039e477bfc867e92
SHA5129313342c425e7e28ffdfb726565898c956df0c9eab77cc3721dfca9dc61a3a075736a3060622f5f2ab447707ce36a2938e2b26195f8b0ab754c489b8266b77bf
-
Filesize
57KB
MD558705405c32d63450d0b3f21d30352bb
SHA150fe0e234c6346c213b6a936427462b2586718df
SHA256a6a714ae280b2b8e179f0898bbc7156bdc129a5a2d8326959978a6d315dbba63
SHA512e09abd876cea9f70710f1c3d77d3c4230fa8573a688d54bcf4867f0a433706dad25d45d03a3cc577c4351c1f31cc9ee77331256110aa16ac0c48bd9693a035a8