Analysis
-
max time kernel
56s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
9aa8e640a659ffe47ed3665ac11482b0.exe
Resource
win7-20231215-en
General
-
Target
9aa8e640a659ffe47ed3665ac11482b0.exe
-
Size
2.9MB
-
MD5
9aa8e640a659ffe47ed3665ac11482b0
-
SHA1
da0ad6136c04c616f814ed4a6638972fe7821955
-
SHA256
06be4fd28372a6476533130d18bb309666c3e3601dd037b3b7e8795a1c791a74
-
SHA512
56cc641bb4d4457a8b718ee1f2ffd282f2f41d5147365652448ad43b29823b7843c5d9098cd64d1512471f54be2a62e62144113a9214254f595a59d9332be2ac
-
SSDEEP
49152:xcBpEwJ84vLRaBtIl9mVOwOBbJxpZpKEy7a+p0wnRKAQmM/84+cPzkot0zaHuk:xXCvLUBsgtOBbJ37KEyO+p0ah39TGk/+
Malware Config
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
nullmixer
http://hsiens.xyz/
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/files/0x0006000000023155-63.dat family_fabookie behavioral2/files/0x0006000000023155-69.dat family_fabookie -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 3 IoCs
resource yara_rule behavioral2/memory/4000-94-0x0000000001F90000-0x000000000202D000-memory.dmp family_vidar behavioral2/memory/4000-103-0x0000000000400000-0x0000000001DDD000-memory.dmp family_vidar behavioral2/memory/4000-174-0x0000000000400000-0x0000000001DDD000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x000600000002314a-36.dat aspack_v212_v242 behavioral2/files/0x0007000000023145-37.dat aspack_v212_v242 behavioral2/files/0x000600000002314c-41.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 9aa8e640a659ffe47ed3665ac11482b0.exe -
Executes dropped EXE 10 IoCs
pid Process 3688 setup_install.exe 2712 Sun22e130b5496.exe 4940 Sun2258753263251e300.exe 3656 Sun22eecc48a6f1f4.exe 3452 WerFault.exe 3188 Sun228850c358fd3d4a.exe 1656 Sun22c673197d7274.exe 2732 Sun22a21c822a1.exe 4000 Sun2285b7e4eb5bf35.exe 3372 Sun225eed528b6d9efb3.tmp -
Loads dropped DLL 8 IoCs
pid Process 3688 setup_install.exe 3688 setup_install.exe 3688 setup_install.exe 3688 setup_install.exe 3688 setup_install.exe 3688 setup_install.exe 3688 setup_install.exe 3372 Sun225eed528b6d9efb3.tmp -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 17 IoCs
pid pid_target Process procid_target 4768 3688 WerFault.exe 84 1296 4000 WerFault.exe 105 3428 4000 WerFault.exe 105 1764 4000 WerFault.exe 105 3920 4000 WerFault.exe 105 4616 4000 WerFault.exe 105 2384 4000 WerFault.exe 105 3432 4000 WerFault.exe 105 5084 4000 WerFault.exe 105 3312 4000 WerFault.exe 105 3416 4000 WerFault.exe 105 4292 4000 WerFault.exe 105 920 4000 WerFault.exe 105 516 4000 WerFault.exe 105 1224 4000 WerFault.exe 105 628 4000 WerFault.exe 105 4836 4000 WerFault.exe 105 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun22eecc48a6f1f4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun22eecc48a6f1f4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun22eecc48a6f1f4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3656 Sun22eecc48a6f1f4.exe 3656 Sun22eecc48a6f1f4.exe 856 powershell.exe 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 856 powershell.exe 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found 3440 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3656 Sun22eecc48a6f1f4.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2732 Sun22a21c822a1.exe Token: SeDebugPrivilege 1656 Sun22c673197d7274.exe Token: SeDebugPrivilege 856 powershell.exe Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found Token: SeShutdownPrivilege 3440 Process not Found Token: SeCreatePagefilePrivilege 3440 Process not Found -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 3508 wrote to memory of 3688 3508 9aa8e640a659ffe47ed3665ac11482b0.exe 84 PID 3508 wrote to memory of 3688 3508 9aa8e640a659ffe47ed3665ac11482b0.exe 84 PID 3508 wrote to memory of 3688 3508 9aa8e640a659ffe47ed3665ac11482b0.exe 84 PID 3688 wrote to memory of 3600 3688 setup_install.exe 87 PID 3688 wrote to memory of 3600 3688 setup_install.exe 87 PID 3688 wrote to memory of 3600 3688 setup_install.exe 87 PID 3688 wrote to memory of 3104 3688 setup_install.exe 88 PID 3688 wrote to memory of 3104 3688 setup_install.exe 88 PID 3688 wrote to memory of 3104 3688 setup_install.exe 88 PID 3688 wrote to memory of 3280 3688 setup_install.exe 89 PID 3688 wrote to memory of 3280 3688 setup_install.exe 89 PID 3688 wrote to memory of 3280 3688 setup_install.exe 89 PID 3688 wrote to memory of 2868 3688 setup_install.exe 96 PID 3688 wrote to memory of 2868 3688 setup_install.exe 96 PID 3688 wrote to memory of 2868 3688 setup_install.exe 96 PID 3688 wrote to memory of 636 3688 setup_install.exe 94 PID 3688 wrote to memory of 636 3688 setup_install.exe 94 PID 3688 wrote to memory of 636 3688 setup_install.exe 94 PID 3688 wrote to memory of 2504 3688 setup_install.exe 93 PID 3688 wrote to memory of 2504 3688 setup_install.exe 93 PID 3688 wrote to memory of 2504 3688 setup_install.exe 93 PID 3688 wrote to memory of 2036 3688 setup_install.exe 92 PID 3688 wrote to memory of 2036 3688 setup_install.exe 92 PID 3688 wrote to memory of 2036 3688 setup_install.exe 92 PID 3688 wrote to memory of 1868 3688 setup_install.exe 90 PID 3688 wrote to memory of 1868 3688 setup_install.exe 90 PID 3688 wrote to memory of 1868 3688 setup_install.exe 90 PID 3688 wrote to memory of 2484 3688 setup_install.exe 91 PID 3688 wrote to memory of 2484 3688 setup_install.exe 91 PID 3688 wrote to memory of 2484 3688 setup_install.exe 91 PID 3104 wrote to memory of 4940 3104 cmd.exe 98 PID 3104 wrote to memory of 4940 3104 cmd.exe 98 PID 3104 wrote to memory of 4940 3104 cmd.exe 98 PID 2868 wrote to memory of 2712 2868 cmd.exe 99 PID 2868 wrote to memory of 2712 2868 cmd.exe 99 PID 2484 wrote to memory of 2732 2484 cmd.exe 102 PID 2484 wrote to memory of 2732 2484 cmd.exe 102 PID 3280 wrote to memory of 3656 3280 cmd.exe 95 PID 3280 wrote to memory of 3656 3280 cmd.exe 95 PID 3280 wrote to memory of 3656 3280 cmd.exe 95 PID 2504 wrote to memory of 3452 2504 cmd.exe 135 PID 2504 wrote to memory of 3452 2504 cmd.exe 135 PID 2504 wrote to memory of 3452 2504 cmd.exe 135 PID 2036 wrote to memory of 3188 2036 cmd.exe 100 PID 2036 wrote to memory of 3188 2036 cmd.exe 100 PID 2036 wrote to memory of 3188 2036 cmd.exe 100 PID 1868 wrote to memory of 1656 1868 cmd.exe 101 PID 1868 wrote to memory of 1656 1868 cmd.exe 101 PID 3600 wrote to memory of 856 3600 cmd.exe 104 PID 3600 wrote to memory of 856 3600 cmd.exe 104 PID 3600 wrote to memory of 856 3600 cmd.exe 104 PID 636 wrote to memory of 4000 636 cmd.exe 105 PID 636 wrote to memory of 4000 636 cmd.exe 105 PID 636 wrote to memory of 4000 636 cmd.exe 105 PID 3452 wrote to memory of 3372 3452 WerFault.exe 107 PID 3452 wrote to memory of 3372 3452 WerFault.exe 107 PID 3452 wrote to memory of 3372 3452 WerFault.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aa8e640a659ffe47ed3665ac11482b0.exe"C:\Users\Admin\AppData\Local\Temp\9aa8e640a659ffe47ed3665ac11482b0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\7zS4BDB42C7\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4BDB42C7\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun2258753263251e300.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\7zS4BDB42C7\Sun2258753263251e300.exeSun2258753263251e300.exe4⤵
- Executes dropped EXE
PID:4940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun22eecc48a6f1f4.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\7zS4BDB42C7\Sun22eecc48a6f1f4.exeSun22eecc48a6f1f4.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun22c673197d7274.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\7zS4BDB42C7\Sun22c673197d7274.exeSun22c673197d7274.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun22a21c822a1.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\7zS4BDB42C7\Sun22a21c822a1.exeSun22a21c822a1.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun228850c358fd3d4a.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\7zS4BDB42C7\Sun228850c358fd3d4a.exeSun228850c358fd3d4a.exe4⤵
- Executes dropped EXE
PID:3188
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun225eed528b6d9efb3.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\7zS4BDB42C7\Sun225eed528b6d9efb3.exeSun225eed528b6d9efb3.exe4⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\is-JPK8P.tmp\Sun225eed528b6d9efb3.tmp"C:\Users\Admin\AppData\Local\Temp\is-JPK8P.tmp\Sun225eed528b6d9efb3.tmp" /SL5="$B0182,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS4BDB42C7\Sun225eed528b6d9efb3.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3372
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun2285b7e4eb5bf35.exe3⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\7zS4BDB42C7\Sun2285b7e4eb5bf35.exeSun2285b7e4eb5bf35.exe4⤵
- Executes dropped EXE
PID:4000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 8245⤵
- Program crash
PID:1296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 8445⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 8925⤵
- Program crash
PID:1764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 9005⤵
- Program crash
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 10405⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 10685⤵
- Program crash
PID:2384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 15285⤵
- Program crash
PID:3432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 15365⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 17885⤵
- Program crash
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 15645⤵
- Program crash
PID:3416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 15325⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 16165⤵
- Program crash
PID:920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 16525⤵
- Program crash
PID:516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 15285⤵
- Program crash
PID:1224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 16165⤵
- Program crash
PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 15285⤵
- Program crash
PID:4836
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun22e130b5496.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\7zS4BDB42C7\Sun22e130b5496.exeSun22e130b5496.exe4⤵
- Executes dropped EXE
PID:2712
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 4923⤵
- Program crash
PID:4768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3688 -ip 36881⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4000 -ip 40001⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4000 -ip 40001⤵PID:1240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4000 -ip 40001⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4000 -ip 40001⤵PID:936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4000 -ip 40001⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4000 -ip 40001⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4000 -ip 40001⤵PID:2476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4000 -ip 40001⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4000 -ip 40001⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4000 -ip 40001⤵PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4000 -ip 40001⤵PID:4068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4000 -ip 40001⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4000 -ip 40001⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4000 -ip 40001⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4000 -ip 40001⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4000 -ip 40001⤵PID:4452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD56a74bd82aebb649898a4286409371cc2
SHA1be1ba3f918438d643da499c25bfb5bdeb77dd2e2
SHA256f0a03868c41f48c86446225487eda0e92fb26319174209c55bd0a941537d3f5a
SHA51262a36e3c685f02e7344ca9c651ae12a2ebedd4ff55cf6206f03fbdca84fc555b95bcb6fcf1889d273676ddd33f85c5bcbe3862a56151149c36d32ef868b00707
-
Filesize
50KB
MD57182439b571dfa20b69d517f6e527b53
SHA10877b808375f1c6704974330960f739dd5bc2c8f
SHA256b2588aac3dceef731bfcc8b15605f0cb15a26754b7e6c1c5424c7bbe710a13d6
SHA5120812b7ebd03d94042225caace4ff5cf37fc658371b4a6db4482051ae33920ee8a196aadd41337cdeed2f8890438b540efaa67737bb033888847290cd99eb0e8e
-
Filesize
757KB
MD58887a710e57cf4b3fe841116e9a0dfdd
SHA18c1f068d5dda6b53db1c0ba23fd300ac2f2197c4
SHA256e045b4a1c9f6640814f6e39903e1f03f2c7f1e3b3d1c6dbf07a409732655eff4
SHA5121507f3d3a32c8c0d1ae2ee2a6f02f86f7de5f956ef066c7284ff4f847a5fe8322984043ee95b576eb4d40b2f08508e49059a581443605978ec4cba03da1273a6
-
Filesize
27KB
MD588088d00ebe425991d4aa66d8eb60ad5
SHA19d71ff7417fc989499f48e86337d2233d71a0ceb
SHA2564089cf9dd94e35528c5ab46a9b02617f549de2d29d1f2f426d436d4272f6be69
SHA51280786f06225ea7c04457e71534af1fcd5ddaa307e530c2b08a08542115fef58e02e7e96a94d410a70b9a78c36896065b4694088130af91b2e0f3fcf3a8683451
-
Filesize
576KB
MD57b1e08adae5f1373c4b845a09982d0a3
SHA14838a531872de3ed82dc9e191c9a582fb5ea530c
SHA256e651a40b14c10f0c8ba9c4fb3cd648a04cad7f226e4a0a25664135e0ce5f4b52
SHA5127d6e51eddccfa039ea5dbaffb19ed211a50dd86dece6f588d2466f35a00107be9fa137f7d795627799def8c399aaaac5670d9f2ae2fc7e601cb186e4f9e73641
-
Filesize
116KB
MD5b66aa274419282023f4d52fa8355d339
SHA1e7fe8ddf99e124bfd46217280d55049fd121ff05
SHA2569d9038a3fad8e93dcfd38837a287a6c4c87270207b842a53fdb0fb2376109281
SHA5124e54e8b2b3c41f075744869d9fbd2eb2e8d361ed7ad79d59bd70f2d3712a198f75d8836b0c34eb5fe3203b31b6c11c25b5589a90e3f304306447fd736ffdd0b6
-
Filesize
989KB
MD5f262fc230be2b1721ab2a7791980566e
SHA11d28ebcaad3e53a7ae5a6e56e143b39fd4520409
SHA25683c8c6dede6ba552ef55d8fba96bd484b022df2018edde8cd014c42844cc1bc5
SHA512e0870b31b46369c8082ec8da54da75e3a00d8d17625c6a42e95377bc03ca319aaf31db4f0ea5ea67634b49b13e9fddc5721e1b4eff968c987efd85c6a9b803c6
-
Filesize
8KB
MD5abea1f518f0b3957a1755eae02698ca3
SHA1b3130e09832595c47cfb06a883388fabdd5bc488
SHA2561b9d29f4887cb5ec2f7980f3b51fccf0eb699bf81361b31342e9a895cc362c8d
SHA512ee7dd52b1941e64d08eb036839fde49975246c4564aaae577252f988586bf52c1ac59de81ea28cedeb06b723a9317ad1c60fa1ba4c42b7dae6e0cea8405ddfc5
-
Filesize
57KB
MD5e5d390b7a2302e3615f21ad5af7c1639
SHA1ab8fd9374318ef9dcb183c9fe4acdc499d9baf49
SHA256d9ab4842f0a654640dd5be127338ad8949d027e2bfee24e209199907914c4475
SHA5123e9d56a601459224fe4369368eb1c223d53bae91823552e797b81075ac3177d1dd4e3506300ab17db07ad452dac40db7fa6a45f05a98aae31502bc088cc16198
-
Filesize
152KB
MD57b9b0197f1ed02fd7830a7e588a1c7a4
SHA1732474ad1ee1a9c533d18f02e8dec4e1256a74e1
SHA256376c4d62f6922dfcfb27c519f56d39ffbffbb82666cb2e4c96578aa1e6321523
SHA512dca1df9a2af2a9ebcc5bbfb75d2b4881d41f22ff928131a6079ba986b1d3fe289c2850e96478221140789a82a8006239a7a13d782148d89cd843da97361bdeb7
-
Filesize
100KB
MD55bac03dcf05906306b171041f8aeeffc
SHA1a7683c9b971261ba73d083f037723fa51863c718
SHA256aa63047aeb8d8c6ffbb2624ff46b4160ae44294f8330a2879fba47fee94ae332
SHA5124ff913e6ae12e5fb7da9db797535e30a32207471be9774c16b91c807a5a95b4ef6c63dc835e37a821b4db972f3b601c24bfe73e56e8e702c4143b76864c69625
-
Filesize
918KB
MD5d23f66150f5f8ff70d68eac92ff2a5e7
SHA190ac16306c787e74e0324572be74b057a850732d
SHA256d304d1b3ab561433fbf02f58cd30aecd416c034d5d93ffa214c60696f6afa35c
SHA512b573a82da3929eb2ff5294436b24f12a4a406e7787726a053c7813f672ad243281a289eb35f6f9e16c1bb60afb976afdf1c681d8f1aaa3106e94c9449b850ae6
-
Filesize
116KB
MD535cff97bc372ca1bfffa6845b8a199f7
SHA16675b0edcf1aa7a28de899dad40c96e59c4fcca4
SHA256452197bef935f7ee40d2225a6f69be172ed70cc647ce27e68ce5d6ef76c77f31
SHA51243a8b00b1c8141e3e0c3b155732ca55130a8c890aacc423bfa92be5e9660c3d9d116d01030d91ad59b2980f7fba4772c7105c3d048b8d4dcaafd41067e9ab069
-
Filesize
208KB
MD557506c6106f4c4e9b795d68f247a7bf0
SHA1937d9694d68082c8d12fc0d31965514c881e2eab
SHA25611577fc5b67317c24be99806ce1d5a41b5eac4dc96d1eb23983e1bbea2d003e4
SHA512bbc0ad52ca09ecf4d4bc23ed68b1d02a6b47771ff7f6a4fa2a62e6ce4301385d0771f3fb4a9cd8330bbf712b3d41b14f1f1608aed45a12a2850239ee897b1636
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
2.1MB
MD5feafec96b877fbd1d5ae597a5ede4ba9
SHA1d09fad03aa262bf0fbf4a48d2d97b82ffca0ac18
SHA25611cd50256a82cacce3ff52d2d0322f76ed8cbc89050d15fe88b9a06310d19baa
SHA512eb1e6d29478caec975b9f13aa9015480b36f554942b2915b09e627a0dea89cfaaf4e428cc8764417b6e2698fa28b850a2401d1b82ad0847330905d2a16afd724
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
Filesize
350KB
MD58c71ee2abd771edb02cdde47ec7022df
SHA17cb3aeb563ba6972bf18957a8a3375bd93c5db55
SHA2563904c9cfe9c6010a469a2761554846e199c87cd8a73b9f1597ca777ca1a03916
SHA512773c804e689be3d32ea82cec931cfafbbb6ba146bbad0f012e18539035aa2255cfcad88abb69ea668394c1af9e228a5cfdfb9f4bf5c987991056ec693542996b
-
Filesize
246KB
MD5bbf6694800a5fe7601f07804560f8ab1
SHA19507b8da96d2a87dc051bd367ba14484ac6bbd33
SHA256d26e8cc4672031322c0a0ea974659646d02666e67783b7404a4f755089dce449
SHA51204eb407693b49317689fddc9597c022a14dc4a78d46134d26f9de5f4c7d22f83f61f49923b3d9ba8337fe0a6de1edf587912cc44b138eb17c68d59c6e7765b21