Analysis

  • max time kernel
    143s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2024 17:44

General

  • Target

    9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe

  • Size

    441KB

  • MD5

    258e294a16170fba05529bcce0263608

  • SHA1

    50cc521dd5b5a9aa0e47870bc6dffa651ea7ae34

  • SHA256

    9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3

  • SHA512

    7f015af852be227e970e27ad2733fd8eaa076795faad34f01f3615656dcc62b3eae72d63fb2930cac8330917ceb843b30fad2e7e9bb34352681691c6e7c8fe3f

  • SSDEEP

    6144:h0h+V80D4cOyLE6lE/AW2BhkFvKwkZ+eXH+wVM21+rmqmvGIF:h++V80DXOn6luAjh+bwVMMd

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

Attributes
  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 43 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe
    "C:\Users\Admin\AppData\Local\Temp\9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 744
      2⤵
      • Program crash
      PID:4972
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 800
      2⤵
      • Program crash
      PID:764
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 856
      2⤵
      • Program crash
      PID:2552
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 864
      2⤵
      • Program crash
      PID:2060
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 860
      2⤵
      • Program crash
      PID:1476
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 860
      2⤵
      • Program crash
      PID:4492
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 1120
      2⤵
      • Program crash
      PID:1416
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 1172
      2⤵
      • Program crash
      PID:2368
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 1236
      2⤵
      • Program crash
      PID:2936
    • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
      2⤵
      • Executes dropped EXE
      PID:1400
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 472
        3⤵
        • Program crash
        PID:1228
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 1292
      2⤵
      • Program crash
      PID:3696
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2376 -ip 2376
    1⤵
      PID:1224
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2376 -ip 2376
      1⤵
        PID:3676
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2376 -ip 2376
        1⤵
          PID:4472
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2376 -ip 2376
          1⤵
            PID:1400
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2376 -ip 2376
            1⤵
              PID:888
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2376 -ip 2376
              1⤵
                PID:1652
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2376 -ip 2376
                1⤵
                  PID:3840
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2376 -ip 2376
                  1⤵
                    PID:1632
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2376 -ip 2376
                    1⤵
                      PID:4628
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2376 -ip 2376
                      1⤵
                        PID:1248
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1400 -ip 1400
                        1⤵
                          PID:892
                        • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                          C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                          1⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:1624
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 524
                            2⤵
                            • Program crash
                            PID:3412
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 532
                            2⤵
                            • Program crash
                            PID:2476
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 528
                            2⤵
                            • Program crash
                            PID:1120
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 680
                            2⤵
                            • Program crash
                            PID:892
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 812
                            2⤵
                            • Program crash
                            PID:1572
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 844
                            2⤵
                            • Program crash
                            PID:1436
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 880
                            2⤵
                            • Program crash
                            PID:3180
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 880
                            2⤵
                            • Program crash
                            PID:232
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 972
                            2⤵
                            • Program crash
                            PID:2808
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 832
                            2⤵
                            • Program crash
                            PID:2224
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 992
                            2⤵
                            • Program crash
                            PID:2448
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 1288
                            2⤵
                            • Program crash
                            PID:2860
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 1400
                            2⤵
                            • Program crash
                            PID:2876
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 1572
                            2⤵
                            • Program crash
                            PID:4032
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /k "taskkill /f /im "Dctooux.exe" && timeout 1 && del "Dctooux.exe" && ren 54a870 Dctooux.exe && C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe && Exit"
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2572
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /f /im "Dctooux.exe"
                              3⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2224
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout 1
                              3⤵
                              • Delays execution with timeout.exe
                              PID:4496
                            • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                              C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                              3⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:4836
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 524
                                4⤵
                                • Program crash
                                PID:1400
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 544
                                4⤵
                                • Program crash
                                PID:4892
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 592
                                4⤵
                                • Program crash
                                PID:912
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 692
                                4⤵
                                • Program crash
                                PID:4196
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 820
                                4⤵
                                • Program crash
                                PID:2176
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 828
                                4⤵
                                • Program crash
                                PID:4760
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 856
                                4⤵
                                • Program crash
                                PID:3696
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 676
                                4⤵
                                • Program crash
                                PID:2848
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 912
                                4⤵
                                • Program crash
                                PID:3024
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 988
                                4⤵
                                • Program crash
                                PID:3288
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 1116
                                4⤵
                                • Program crash
                                PID:4472
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 1292
                                4⤵
                                • Program crash
                                PID:4104
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 1548
                                4⤵
                                • Program crash
                                PID:2848
                              • C:\Windows\SysWOW64\rundll32.exe
                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
                                4⤵
                                • Loads dropped DLL
                                • Suspicious use of WriteProcessMemory
                                PID:1120
                                • C:\Windows\system32\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
                                  5⤵
                                  • Blocklisted process makes network request
                                  • Loads dropped DLL
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of WriteProcessMemory
                                  PID:3700
                                  • C:\Windows\system32\netsh.exe
                                    netsh wlan show profiles
                                    6⤵
                                      PID:3024
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\904519900954_Desktop.zip' -CompressionLevel Optimal
                                      6⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3464
                                • C:\Windows\SysWOW64\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
                                  4⤵
                                  • Blocklisted process makes network request
                                  • Loads dropped DLL
                                  PID:232
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 1360
                                  4⤵
                                  • Program crash
                                  PID:764
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 1560
                                  4⤵
                                  • Program crash
                                  PID:760
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 1552
                              2⤵
                              • Program crash
                              PID:1476
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1624 -ip 1624
                            1⤵
                              PID:4924
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1624 -ip 1624
                              1⤵
                                PID:1220
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1624 -ip 1624
                                1⤵
                                  PID:4796
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1624 -ip 1624
                                  1⤵
                                    PID:4836
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1624 -ip 1624
                                    1⤵
                                      PID:2052
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1624 -ip 1624
                                      1⤵
                                        PID:3016
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1624 -ip 1624
                                        1⤵
                                          PID:3440
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1624 -ip 1624
                                          1⤵
                                            PID:4812
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1624 -ip 1624
                                            1⤵
                                              PID:4196
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1624 -ip 1624
                                              1⤵
                                                PID:4548
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1624 -ip 1624
                                                1⤵
                                                  PID:2176
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1624 -ip 1624
                                                  1⤵
                                                    PID:1676
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1624 -ip 1624
                                                    1⤵
                                                      PID:3652
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1624 -ip 1624
                                                      1⤵
                                                        PID:64
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1624 -ip 1624
                                                        1⤵
                                                          PID:1852
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4836 -ip 4836
                                                          1⤵
                                                            PID:5004
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4836 -ip 4836
                                                            1⤵
                                                              PID:1572
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4836 -ip 4836
                                                              1⤵
                                                                PID:64
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4836 -ip 4836
                                                                1⤵
                                                                  PID:3288
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4836 -ip 4836
                                                                  1⤵
                                                                    PID:872
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4836 -ip 4836
                                                                    1⤵
                                                                      PID:740
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4836 -ip 4836
                                                                      1⤵
                                                                        PID:4492
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4836 -ip 4836
                                                                        1⤵
                                                                          PID:1228
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4836 -ip 4836
                                                                          1⤵
                                                                            PID:1496
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4836 -ip 4836
                                                                            1⤵
                                                                              PID:2020
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4836 -ip 4836
                                                                              1⤵
                                                                                PID:4196
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4836 -ip 4836
                                                                                1⤵
                                                                                  PID:2224
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4836 -ip 4836
                                                                                  1⤵
                                                                                    PID:1572
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1040 --field-trial-handle=2280,i,8281149332300504990,9122875031903898779,262144 --variations-seed-version /prefetch:8
                                                                                    1⤵
                                                                                      PID:1280
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4836 -ip 4836
                                                                                      1⤵
                                                                                        PID:2932
                                                                                      • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                                        1⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:1032
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 436
                                                                                          2⤵
                                                                                          • Program crash
                                                                                          PID:1576
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1032 -ip 1032
                                                                                        1⤵
                                                                                          PID:3484
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4836 -ip 4836
                                                                                          1⤵
                                                                                            PID:4048
                                                                                          • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                                            1⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:2228
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 444
                                                                                              2⤵
                                                                                              • Program crash
                                                                                              PID:2260
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 2228 -ip 2228
                                                                                            1⤵
                                                                                              PID:3676

                                                                                            Network

                                                                                            MITRE ATT&CK Enterprise v15

                                                                                            Replay Monitor

                                                                                            Loading Replay Monitor...

                                                                                            Downloads

                                                                                            • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

                                                                                              Filesize

                                                                                              441KB

                                                                                              MD5

                                                                                              258e294a16170fba05529bcce0263608

                                                                                              SHA1

                                                                                              50cc521dd5b5a9aa0e47870bc6dffa651ea7ae34

                                                                                              SHA256

                                                                                              9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3

                                                                                              SHA512

                                                                                              7f015af852be227e970e27ad2733fd8eaa076795faad34f01f3615656dcc62b3eae72d63fb2930cac8330917ceb843b30fad2e7e9bb34352681691c6e7c8fe3f

                                                                                            • C:\Users\Admin\AppData\Local\Temp\904519900954

                                                                                              Filesize

                                                                                              83KB

                                                                                              MD5

                                                                                              dbeb94bdc5ef29994c288f4d45788cd2

                                                                                              SHA1

                                                                                              e46e67dd0bd6edce05d6193ea75002e2fd15208f

                                                                                              SHA256

                                                                                              b324b09409f26b2f7fe540f1d5f20440769dbcbd2d9a8209235a9751cb1bbbad

                                                                                              SHA512

                                                                                              3a60e4b2981c0907bc80666a1c2afb04bf3eef33362f18e671988bf56d70bc05622a81bc77426820728bf1800345c248afbbe301c84495d56e10184d7585e3c9

                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dpfn3icn.ywm.ps1

                                                                                              Filesize

                                                                                              60B

                                                                                              MD5

                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                              SHA1

                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                              SHA256

                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                              SHA512

                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                            • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

                                                                                              Filesize

                                                                                              109KB

                                                                                              MD5

                                                                                              ca684dc5ebed4381701a39f1cc3a0fb2

                                                                                              SHA1

                                                                                              8c4a375aa583bd1c705597a7f45fd18934276770

                                                                                              SHA256

                                                                                              b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2

                                                                                              SHA512

                                                                                              8b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510

                                                                                            • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                                                              Filesize

                                                                                              231KB

                                                                                              MD5

                                                                                              03d9212e693d88c93e43131bd4f8c1fb

                                                                                              SHA1

                                                                                              73e676d8c8910c89d8bee6d77ad5a04d4d69dcce

                                                                                              SHA256

                                                                                              24873dcece96c7461532a4631beb308c49c71921379aa384c28e9da09d0bff7b

                                                                                              SHA512

                                                                                              32622e2da107fd7f08e6408cbcc053ea031d01480455e6ce03ccf001ed9941e928419f6264f995afeec5fafcf1ead89dabb887128579224507497137038024b4

                                                                                            • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                                                              Filesize

                                                                                              1.2MB

                                                                                              MD5

                                                                                              4876ee75ce2712147c41ff1277cd2d30

                                                                                              SHA1

                                                                                              3733dc92318f0c6b92cb201e49151686281acda6

                                                                                              SHA256

                                                                                              bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed

                                                                                              SHA512

                                                                                              9bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9

                                                                                            • memory/1032-108-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/1032-109-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/1032-107-0x0000000000CA0000-0x0000000000DA0000-memory.dmp

                                                                                              Filesize

                                                                                              1024KB

                                                                                            • memory/1400-18-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/1400-20-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/1400-17-0x0000000000D80000-0x0000000000DEF000-memory.dmp

                                                                                              Filesize

                                                                                              444KB

                                                                                            • memory/1400-16-0x0000000000E40000-0x0000000000F40000-memory.dmp

                                                                                              Filesize

                                                                                              1024KB

                                                                                            • memory/1624-24-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/1624-42-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/1624-23-0x0000000000BA0000-0x0000000000CA0000-memory.dmp

                                                                                              Filesize

                                                                                              1024KB

                                                                                            • memory/2228-119-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/2228-118-0x0000000000E40000-0x0000000000F40000-memory.dmp

                                                                                              Filesize

                                                                                              1024KB

                                                                                            • memory/2228-120-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/2376-1-0x0000000000BB0000-0x0000000000CB0000-memory.dmp

                                                                                              Filesize

                                                                                              1024KB

                                                                                            • memory/2376-19-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/2376-3-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/2376-2-0x0000000002860000-0x00000000028CF000-memory.dmp

                                                                                              Filesize

                                                                                              444KB

                                                                                            • memory/3464-91-0x00007FF95C950000-0x00007FF95D411000-memory.dmp

                                                                                              Filesize

                                                                                              10.8MB

                                                                                            • memory/3464-84-0x000002284FF00000-0x000002284FF12000-memory.dmp

                                                                                              Filesize

                                                                                              72KB

                                                                                            • memory/3464-85-0x000002284FEE0000-0x000002284FEEA000-memory.dmp

                                                                                              Filesize

                                                                                              40KB

                                                                                            • memory/3464-82-0x000002284F9A0000-0x000002284F9B0000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/3464-81-0x000002284F9A0000-0x000002284F9B0000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/3464-80-0x00007FF95C950000-0x00007FF95D411000-memory.dmp

                                                                                              Filesize

                                                                                              10.8MB

                                                                                            • memory/3464-70-0x000002284F9F0000-0x000002284FA12000-memory.dmp

                                                                                              Filesize

                                                                                              136KB

                                                                                            • memory/4836-83-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/4836-103-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/4836-69-0x0000000000C40000-0x0000000000D40000-memory.dmp

                                                                                              Filesize

                                                                                              1024KB

                                                                                            • memory/4836-57-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/4836-47-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                              Filesize

                                                                                              7.1MB

                                                                                            • memory/4836-46-0x0000000000C40000-0x0000000000D40000-memory.dmp

                                                                                              Filesize

                                                                                              1024KB