Analysis
-
max time kernel
1s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
231db005bf29ea596c7af4c264c0cca57271bb67d2208dfb8e320a4462767327.exe
Resource
win7-20231129-en
General
-
Target
231db005bf29ea596c7af4c264c0cca57271bb67d2208dfb8e320a4462767327.exe
-
Size
4.1MB
-
MD5
b157e72b328d941ff95bcedb357e2b1b
-
SHA1
9697221387a51260eeb70fba1d17c271e443e716
-
SHA256
231db005bf29ea596c7af4c264c0cca57271bb67d2208dfb8e320a4462767327
-
SHA512
3a3946398d8aaa499a12a5809648e509a708860a4ca2991e277123351034061e4fa2839743c91822143e105cf48f315e46347608dc1ebac060d2a9ba039bd21d
-
SSDEEP
49152:irtHaZL5Wjk2KurtcZtm0QlCmj+rYGWWB1XMO8YNtIyBSH302qqrJccUXAFAwijV:i5gLD3ycXi38WWB5tjCkyW4IRgc
Malware Config
Signatures
-
Glupteba payload 7 IoCs
resource yara_rule behavioral2/memory/3624-2-0x00000000052B0000-0x0000000005B9B000-memory.dmp family_glupteba behavioral2/memory/3624-3-0x0000000000400000-0x0000000002FC8000-memory.dmp family_glupteba behavioral2/memory/1120-56-0x0000000000400000-0x0000000002FC8000-memory.dmp family_glupteba behavioral2/memory/3624-58-0x00000000052B0000-0x0000000005B9B000-memory.dmp family_glupteba behavioral2/memory/3624-84-0x0000000000400000-0x0000000002FC8000-memory.dmp family_glupteba behavioral2/memory/1120-187-0x0000000000400000-0x0000000002FC8000-memory.dmp family_glupteba behavioral2/memory/3300-261-0x0000000000400000-0x0000000002FC8000-memory.dmp family_glupteba -
Detects Windows executables referencing non-Windows User-Agents 5 IoCs
resource yara_rule behavioral2/memory/3624-3-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1120-56-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3624-84-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1120-187-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3300-261-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables Discord URL observed in first stage droppers 5 IoCs
resource yara_rule behavioral2/memory/3624-3-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1120-56-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/3624-84-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1120-187-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/3300-261-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Detects executables containing URLs to raw contents of a Github gist 5 IoCs
resource yara_rule behavioral2/memory/3624-3-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1120-56-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3624-84-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1120-187-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3300-261-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Detects executables containing artifacts associated with disabling Widnows Defender 5 IoCs
resource yara_rule behavioral2/memory/3624-3-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1120-56-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/3624-84-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1120-187-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/3300-261-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables referencing many varying, potentially fake Windows User-Agents 5 IoCs
resource yara_rule behavioral2/memory/3624-3-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1120-56-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/3624-84-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1120-187-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/3300-261-0x0000000000400000-0x0000000002FC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3900 netsh.exe -
Program crash 46 IoCs
pid pid_target Process procid_target 576 3624 WerFault.exe 19 688 3624 WerFault.exe 19 4732 3624 WerFault.exe 19 3424 3624 WerFault.exe 19 504 3624 WerFault.exe 19 3900 3624 WerFault.exe 19 2724 3624 WerFault.exe 19 208 3624 WerFault.exe 19 4520 3624 WerFault.exe 19 2444 3624 WerFault.exe 19 1688 3624 WerFault.exe 19 4812 3624 WerFault.exe 19 3228 3624 WerFault.exe 19 3692 3624 WerFault.exe 19 4064 3624 WerFault.exe 19 3456 3624 WerFault.exe 19 2424 3624 WerFault.exe 19 4728 3624 WerFault.exe 19 4624 3624 WerFault.exe 19 3220 1120 WerFault.exe 129 4448 1120 WerFault.exe 129 3716 1120 WerFault.exe 129 2692 1120 WerFault.exe 129 2572 1120 WerFault.exe 129 2360 1120 WerFault.exe 129 4984 1120 WerFault.exe 129 4500 1120 WerFault.exe 129 3100 1120 WerFault.exe 129 3844 3300 WerFault.exe 159 1484 3300 WerFault.exe 159 3704 3300 WerFault.exe 159 2972 3300 WerFault.exe 159 1100 3300 WerFault.exe 159 3788 3300 WerFault.exe 159 2116 3300 WerFault.exe 159 1492 3300 WerFault.exe 159 4916 3300 WerFault.exe 159 3856 3300 WerFault.exe 159 2444 3300 WerFault.exe 159 4996 3300 WerFault.exe 159 4916 3300 WerFault.exe 159 4056 3300 WerFault.exe 159 5012 3300 WerFault.exe 159 3860 3300 WerFault.exe 159 3152 3300 WerFault.exe 159 4768 3300 WerFault.exe 159 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 856 schtasks.exe 1560 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\231db005bf29ea596c7af4c264c0cca57271bb67d2208dfb8e320a4462767327.exe"C:\Users\Admin\AppData\Local\Temp\231db005bf29ea596c7af4c264c0cca57271bb67d2208dfb8e320a4462767327.exe"1⤵PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 4802⤵
- Program crash
PID:576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 4962⤵
- Program crash
PID:688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 5122⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 6202⤵
- Program crash
PID:3424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 7242⤵
- Program crash
PID:504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 7442⤵
- Program crash
PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 7442⤵
- Program crash
PID:2724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 7122⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 6762⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 7682⤵
- Program crash
PID:2444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 7082⤵
- Program crash
PID:1688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 8762⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 8282⤵
- Program crash
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 6202⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 6202⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 8842⤵
- Program crash
PID:3456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 8762⤵
- Program crash
PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 8642⤵
- Program crash
PID:4728
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 8802⤵
- Program crash
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\231db005bf29ea596c7af4c264c0cca57271bb67d2208dfb8e320a4462767327.exe"C:\Users\Admin\AppData\Local\Temp\231db005bf29ea596c7af4c264c0cca57271bb67d2208dfb8e320a4462767327.exe"2⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 4523⤵
- Program crash
PID:3220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 4683⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 6963⤵
- Program crash
PID:3716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 6963⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 6523⤵
- Program crash
PID:2572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 6963⤵
- Program crash
PID:2360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 7243⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 4723⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 7443⤵
- Program crash
PID:3100
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:1740
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:992
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:240
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:4628
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:3300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 4804⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 4964⤵
- Program crash
PID:1484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 5044⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 6724⤵
- Program crash
PID:2972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 6724⤵
- Program crash
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 7404⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 7564⤵
- Program crash
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 7844⤵
- Program crash
PID:1492
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 7284⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 9364⤵
- Program crash
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 9124⤵
- Program crash
PID:2444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 8924⤵
- Program crash
PID:4996
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4632
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1560
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 8444⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 9924⤵
- Program crash
PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:2908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 7324⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 7324⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 9724⤵
- Program crash
PID:3152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 6164⤵
- Program crash
PID:4768
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:856
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3624 -ip 36241⤵PID:2456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3624 -ip 36241⤵PID:2384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3624 -ip 36241⤵PID:2200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3624 -ip 36241⤵PID:3312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3624 -ip 36241⤵PID:2744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3624 -ip 36241⤵PID:856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3624 -ip 36241⤵PID:1292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3624 -ip 36241⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3624 -ip 36241⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3624 -ip 36241⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3624 -ip 36241⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3624 -ip 36241⤵PID:4792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3624 -ip 36241⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3624 -ip 36241⤵PID:3856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3624 -ip 36241⤵PID:732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3624 -ip 36241⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3624 -ip 36241⤵PID:4080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3624 -ip 36241⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3624 -ip 36241⤵PID:2428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1120 -ip 11201⤵PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1120 -ip 11201⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1120 -ip 11201⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1120 -ip 11201⤵PID:3928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1120 -ip 11201⤵PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1120 -ip 11201⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1120 -ip 11201⤵PID:3616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1120 -ip 11201⤵PID:2740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1120 -ip 11201⤵PID:404
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3300 -ip 33001⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3300 -ip 33001⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3300 -ip 33001⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3300 -ip 33001⤵PID:2308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3300 -ip 33001⤵PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3300 -ip 33001⤵PID:1036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3300 -ip 33001⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3300 -ip 33001⤵PID:2932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3300 -ip 33001⤵PID:2112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3300 -ip 33001⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3300 -ip 33001⤵PID:4000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3300 -ip 33001⤵PID:492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3300 -ip 33001⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3300 -ip 33001⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3300 -ip 33001⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3300 -ip 33001⤵PID:2928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3300 -ip 33001⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3300 -ip 33001⤵PID:1280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
14KB
MD55a319ecd18f78b8e1bc8a1abb7f73bc0
SHA1afa8ec6fba6d0c8ba6c23873ec7ab8dd1e1d8a9f
SHA256982008511c6acbf5a50652673ba4e8d99e5435c7be8ce4ac8beb5356df85f800
SHA51247e38f22bbfbecbf71a95c44b27c5d0a806e95b449aa5622b6d8ad5c4f5064b0cee647f5b8ca0ebdb5fd7384aed44a9fb3939ca9995f1ad7e6d0aae138b02ba4
-
Filesize
18KB
MD53dd84d481040011558a5f1fef8720f02
SHA13151d308fd466c3a4ada6930f6fe377bee749e22
SHA2565d5325c2ea88f7922b86c37b87eaba088f4ed3a6aa93ce7dce9c2115b5703ee5
SHA5129e6e39aea5a5d9a9c3ce58549cc1df1facaa437f157d06d33fe1f110b66a595f6ae9a14a98e611f9354a75238da2637c7891671d7355dbf624f351bf5381fdfa
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57364bdf8975f54bf9ab5874f74978f17
SHA107c59f270277ddd34403f2779fba2dac8f9bdaf9
SHA256c77f30dc6c02e84399138d22b13f2ddcb457dcfe8f04073f8e163f1c33cdaa74
SHA51214a55b77ae4a9f621686dd10bd5be9033a1d8fa1703c444c735a378cb31eb25f917eab9d7a8ec0af8602c44b3289d13e3bfd37d500334ff9c2f83d95ad437d00
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5239f2a723a90c2f86153ff92745cce3c
SHA1eed61b154b8c43d545cec9bdaf2c98a008f19af9
SHA256eb64bfdec253ff9901a7be2df0a4043e6cfee6c9e6cbcf5cbc8af892123a7478
SHA512672d5f0b225b39f11640b13f933d9c5ad64560a84b137957d444bc08212ec254587b13a26dcd5035cc272a8ee9e3722b306941b835e09379f044a23f9060ad7c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a048fb430e3f6aa6802123d5475adb75
SHA14f76c99cd25baa1ddbaccd0b7f96e644abc4690b
SHA2565878be1e6ba6c2411ea076204f0f90c50ab744ae5b61a20a3ee694a1b530be66
SHA51216837f74c502a83fd9025b2300acf015209af32a204c039691d2061c776005b4b9969d61987c912249f12b34eef0b8b070268651683acc2ffaeae06f98ce5db7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5394b0b7b7f693d927f46a0e454da90a9
SHA1b34f72e66608c3b19fc4aa1488ce22ac4b92dc08
SHA2568ac069261663d679d802b8adce5d5d2d451de2411bf6e7b296ea2777f442f27f
SHA512bfab0d2c3cc489979c5bb903b825e3c111daa91fe2a376236a3a45705a6af4cabaf143f0c1ea2ffa02b8e0cfda204bcdedfee6720711be4525561ea65f5524a2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD506e55c207ad31abc5bb7c84b423e84d5
SHA1eeb60bb2dfec2dc754e2f908acbbc1b1bb3a6ce3
SHA256bb1e05dd6b1dcef2f59fc40bb985f8df0c023df6bc25fc0a7b8ca32027b53427
SHA5126f90dd6a2df7cbff70cbfd3f244b6abb3873e66f52bcf8ae8e3302c697b9fe061700dcffe46ab9fda970a16ab6e458cdbbdaeedb384ce7a0799f288603f873b4
-
Filesize
415KB
MD5a859cc305cf79e56691b91f64b694cc6
SHA1f3797a1a1f8580f8a44ee3a9f2434c136c3d079d
SHA256cfb97e54550a185f245b42a2e3a439d700404b926049be8632ece9e6293a54b3
SHA5124bbc8a458901c8cc08836bcb888a53774aa0aaf7a6647cc788cc5215a8aca07b5bdcec22aabe187b0e29e78bc2f0a3479dd60641ed0cdd30349ec731c6f1356d
-
Filesize
272KB
MD546aa02cf067633575bd0fad6c70b9c36
SHA13336f556f738603f8d1862aa5af5ef2abacaabd7
SHA256e81bee701dc01348b4ad2d8f340d10a822eef0c74dd10c3b9640a58ec8f7bf9a
SHA512c9351ac9fc688a3d84a27d8e83e6d40a88dfba39dffeeb343a93cab35c21b1310bbe39c676a055f5d3017e24939be849f2de93b399f333763486c38f684b6714