Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-03-2024 17:44

General

  • Target

    9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe

  • Size

    441KB

  • MD5

    258e294a16170fba05529bcce0263608

  • SHA1

    50cc521dd5b5a9aa0e47870bc6dffa651ea7ae34

  • SHA256

    9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3

  • SHA512

    7f015af852be227e970e27ad2733fd8eaa076795faad34f01f3615656dcc62b3eae72d63fb2930cac8330917ceb843b30fad2e7e9bb34352681691c6e7c8fe3f

  • SSDEEP

    6144:h0h+V80D4cOyLE6lE/AW2BhkFvKwkZ+eXH+wVM21+rmqmvGIF:h++V80DXOn6luAjh+bwVMMd

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 50 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe
    "C:\Users\Admin\AppData\Local\Temp\9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 772
      2⤵
      • Program crash
      PID:900
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 820
      2⤵
      • Program crash
      PID:1412
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 876
      2⤵
      • Program crash
      PID:4808
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 940
      2⤵
      • Program crash
      PID:1424
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 932
      2⤵
      • Program crash
      PID:3676
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 972
      2⤵
      • Program crash
      PID:3160
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 1012
      2⤵
      • Program crash
      PID:4812
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 1040
      2⤵
      • Program crash
      PID:2256
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 1140
      2⤵
      • Program crash
      PID:3544
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 1476
      2⤵
      • Program crash
      PID:1352
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 824
      2⤵
      • Program crash
      PID:3464
    • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3460
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 580
        3⤵
        • Program crash
        PID:2944
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 620
        3⤵
        • Program crash
        PID:3096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 648
        3⤵
        • Program crash
        PID:5044
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 748
        3⤵
        • Program crash
        PID:3240
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 892
        3⤵
        • Program crash
        PID:2728
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 596
        3⤵
        • Program crash
        PID:4628
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 920
        3⤵
        • Program crash
        PID:1768
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 952
        3⤵
        • Program crash
        PID:4140
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 1016
        3⤵
        • Program crash
        PID:2388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 1060
        3⤵
        • Program crash
        PID:3808
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 1168
        3⤵
        • Program crash
        PID:4088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 1364
        3⤵
        • Program crash
        PID:4028
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 1140
        3⤵
        • Program crash
        PID:5020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 1640
        3⤵
        • Program crash
        PID:1080
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k "taskkill /f /im "Dctooux.exe" && timeout 1 && del "Dctooux.exe" && ren 54a870 Dctooux.exe && C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe && Exit"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im "Dctooux.exe"
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3984
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:5108
        • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
          C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4160
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 552
            5⤵
            • Program crash
            PID:1972
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 572
            5⤵
            • Program crash
            PID:3272
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 600
            5⤵
            • Program crash
            PID:2568
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 552
            5⤵
            • Program crash
            PID:248
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 820
            5⤵
            • Program crash
            PID:3160
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 852
            5⤵
            • Program crash
            PID:4812
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 844
            5⤵
            • Program crash
            PID:1980
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 860
            5⤵
            • Program crash
            PID:3508
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 880
            5⤵
            • Program crash
            PID:3636
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 1100
            5⤵
            • Program crash
            PID:4772
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 1124
            5⤵
            • Program crash
            PID:1548
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 1168
            5⤵
            • Program crash
            PID:3704
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 1380
            5⤵
            • Program crash
            PID:3440
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 1588
            5⤵
            • Program crash
            PID:3076
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:4608
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
              6⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1400
              • C:\Windows\system32\netsh.exe
                netsh wlan show profiles
                7⤵
                  PID:3240
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\280069375290_Desktop.zip' -CompressionLevel Optimal
                  7⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3988
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
              5⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              PID:1928
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 1076
              5⤵
              • Program crash
              PID:444
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 1616
              5⤵
              • Program crash
              PID:1488
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 1724
              5⤵
              • Program crash
              PID:3636
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 1116
              5⤵
              • Program crash
              PID:4188
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 1128
              5⤵
              • Program crash
              PID:4584
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 1136
          3⤵
          • Program crash
          PID:2308
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 900
        2⤵
        • Program crash
        PID:3128
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 1288
        2⤵
        • Program crash
        PID:4044
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3328 -ip 3328
      1⤵
        PID:2852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 3328 -ip 3328
        1⤵
          PID:4012
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3328 -ip 3328
          1⤵
            PID:3796
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3328 -ip 3328
            1⤵
              PID:2588
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 3328 -ip 3328
              1⤵
                PID:1240
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3328 -ip 3328
                1⤵
                  PID:2948
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3328 -ip 3328
                  1⤵
                    PID:2800
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3328 -ip 3328
                    1⤵
                      PID:4828
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3328 -ip 3328
                      1⤵
                        PID:1980
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3328 -ip 3328
                        1⤵
                          PID:652
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3328 -ip 3328
                          1⤵
                            PID:4400
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3328 -ip 3328
                            1⤵
                              PID:4788
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3328 -ip 3328
                              1⤵
                                PID:3704
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3460 -ip 3460
                                1⤵
                                  PID:1272
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3460 -ip 3460
                                  1⤵
                                    PID:1320
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3460 -ip 3460
                                    1⤵
                                      PID:4156
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3460 -ip 3460
                                      1⤵
                                        PID:1596
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3460 -ip 3460
                                        1⤵
                                          PID:2788
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3460 -ip 3460
                                          1⤵
                                            PID:1580
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3460 -ip 3460
                                            1⤵
                                              PID:4248
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3460 -ip 3460
                                              1⤵
                                                PID:4068
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3460 -ip 3460
                                                1⤵
                                                  PID:2176
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3460 -ip 3460
                                                  1⤵
                                                    PID:3612
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3460 -ip 3460
                                                    1⤵
                                                      PID:2052
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3460 -ip 3460
                                                      1⤵
                                                        PID:756
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3460 -ip 3460
                                                        1⤵
                                                          PID:3688
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3460 -ip 3460
                                                          1⤵
                                                            PID:3556
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3460 -ip 3460
                                                            1⤵
                                                              PID:748
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4160 -ip 4160
                                                              1⤵
                                                                PID:2208
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4160 -ip 4160
                                                                1⤵
                                                                  PID:2836
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4160 -ip 4160
                                                                  1⤵
                                                                    PID:1788
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4160 -ip 4160
                                                                    1⤵
                                                                      PID:1240
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4160 -ip 4160
                                                                      1⤵
                                                                        PID:4488
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4160 -ip 4160
                                                                        1⤵
                                                                          PID:2060
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4160 -ip 4160
                                                                          1⤵
                                                                            PID:2820
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4160 -ip 4160
                                                                            1⤵
                                                                              PID:3544
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4160 -ip 4160
                                                                              1⤵
                                                                                PID:4524
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4160 -ip 4160
                                                                                1⤵
                                                                                  PID:2524
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4160 -ip 4160
                                                                                  1⤵
                                                                                    PID:4788
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 4160 -ip 4160
                                                                                    1⤵
                                                                                      PID:3128
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4160 -ip 4160
                                                                                      1⤵
                                                                                        PID:4044
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4160 -ip 4160
                                                                                        1⤵
                                                                                          PID:5016
                                                                                        • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:5012
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 472
                                                                                            2⤵
                                                                                            • Program crash
                                                                                            PID:4088
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5012 -ip 5012
                                                                                          1⤵
                                                                                            PID:4912
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4160 -ip 4160
                                                                                            1⤵
                                                                                              PID:4648
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4160 -ip 4160
                                                                                              1⤵
                                                                                                PID:3468
                                                                                              • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:4848
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 472
                                                                                                  2⤵
                                                                                                  • Program crash
                                                                                                  PID:3272
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4848 -ip 4848
                                                                                                1⤵
                                                                                                  PID:440
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4160 -ip 4160
                                                                                                  1⤵
                                                                                                    PID:4600
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4160 -ip 4160
                                                                                                    1⤵
                                                                                                      PID:2812
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4160 -ip 4160
                                                                                                      1⤵
                                                                                                        PID:4572
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                                                        1⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:3704
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 472
                                                                                                          2⤵
                                                                                                          • Program crash
                                                                                                          PID:3192
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 3704 -ip 3704
                                                                                                        1⤵
                                                                                                          PID:956

                                                                                                        Network

                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                        Replay Monitor

                                                                                                        Loading Replay Monitor...

                                                                                                        Downloads

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

                                                                                                          Filesize

                                                                                                          441KB

                                                                                                          MD5

                                                                                                          258e294a16170fba05529bcce0263608

                                                                                                          SHA1

                                                                                                          50cc521dd5b5a9aa0e47870bc6dffa651ea7ae34

                                                                                                          SHA256

                                                                                                          9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3

                                                                                                          SHA512

                                                                                                          7f015af852be227e970e27ad2733fd8eaa076795faad34f01f3615656dcc62b3eae72d63fb2930cac8330917ceb843b30fad2e7e9bb34352681691c6e7c8fe3f

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\280069375290

                                                                                                          Filesize

                                                                                                          77KB

                                                                                                          MD5

                                                                                                          b40f60d29a4c5150e9b50a3782987744

                                                                                                          SHA1

                                                                                                          e5dad6114a414243b3ee154f6fae1cfb410a00f5

                                                                                                          SHA256

                                                                                                          481f6bbc4034b5291a9523f234c32a3e322a02729ad0530433247ddcb7d59b75

                                                                                                          SHA512

                                                                                                          1d4171b2d7cd8b4cee09b341fa05010bfdda4ebb169b1c54288c872f1787af94859e7be628c509fdc6ac5488f22b0df81cab5437573b08c48e3a6102ce08144f

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qlraddrf.gzf.ps1

                                                                                                          Filesize

                                                                                                          60B

                                                                                                          MD5

                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                          SHA1

                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                          SHA256

                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                          SHA512

                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                        • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

                                                                                                          Filesize

                                                                                                          109KB

                                                                                                          MD5

                                                                                                          ca684dc5ebed4381701a39f1cc3a0fb2

                                                                                                          SHA1

                                                                                                          8c4a375aa583bd1c705597a7f45fd18934276770

                                                                                                          SHA256

                                                                                                          b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2

                                                                                                          SHA512

                                                                                                          8b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510

                                                                                                        • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                                                                          Filesize

                                                                                                          1.2MB

                                                                                                          MD5

                                                                                                          4876ee75ce2712147c41ff1277cd2d30

                                                                                                          SHA1

                                                                                                          3733dc92318f0c6b92cb201e49151686281acda6

                                                                                                          SHA256

                                                                                                          bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed

                                                                                                          SHA512

                                                                                                          9bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9

                                                                                                        • memory/3328-2-0x0000000002980000-0x00000000029EF000-memory.dmp

                                                                                                          Filesize

                                                                                                          444KB

                                                                                                        • memory/3328-3-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/3328-1-0x0000000000EE0000-0x0000000000FE0000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/3328-19-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/3460-16-0x0000000000D10000-0x0000000000E10000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/3460-37-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/3460-18-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/3460-17-0x0000000002870000-0x00000000028DF000-memory.dmp

                                                                                                          Filesize

                                                                                                          444KB

                                                                                                        • memory/3704-123-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/3704-122-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/3704-121-0x0000000000D60000-0x0000000000E60000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/3988-75-0x000001EAEEDA0000-0x000001EAEEDB0000-memory.dmp

                                                                                                          Filesize

                                                                                                          64KB

                                                                                                        • memory/3988-82-0x000001EAEF300000-0x000001EAEF312000-memory.dmp

                                                                                                          Filesize

                                                                                                          72KB

                                                                                                        • memory/3988-73-0x00007FFB89BD0000-0x00007FFB8A692000-memory.dmp

                                                                                                          Filesize

                                                                                                          10.8MB

                                                                                                        • memory/3988-74-0x000001EAEEDA0000-0x000001EAEEDB0000-memory.dmp

                                                                                                          Filesize

                                                                                                          64KB

                                                                                                        • memory/3988-77-0x000001EAEEDA0000-0x000001EAEEDB0000-memory.dmp

                                                                                                          Filesize

                                                                                                          64KB

                                                                                                        • memory/3988-64-0x000001EAEED00000-0x000001EAEED22000-memory.dmp

                                                                                                          Filesize

                                                                                                          136KB

                                                                                                        • memory/3988-89-0x00007FFB89BD0000-0x00007FFB8A692000-memory.dmp

                                                                                                          Filesize

                                                                                                          10.8MB

                                                                                                        • memory/3988-83-0x000001EAEED80000-0x000001EAEED8A000-memory.dmp

                                                                                                          Filesize

                                                                                                          40KB

                                                                                                        • memory/4160-103-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/4160-91-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/4160-76-0x0000000000DB0000-0x0000000000EB0000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/4160-52-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/4160-42-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/4160-41-0x0000000000DB0000-0x0000000000EB0000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/4848-110-0x0000000000E80000-0x0000000000F80000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/4848-111-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/4848-112-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/5012-81-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/5012-90-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.1MB

                                                                                                        • memory/5012-80-0x0000000000D70000-0x0000000000E70000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB