Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-03-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe
Resource
win10v2004-20240226-en
General
-
Target
9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe
-
Size
441KB
-
MD5
258e294a16170fba05529bcce0263608
-
SHA1
50cc521dd5b5a9aa0e47870bc6dffa651ea7ae34
-
SHA256
9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3
-
SHA512
7f015af852be227e970e27ad2733fd8eaa076795faad34f01f3615656dcc62b3eae72d63fb2930cac8330917ceb843b30fad2e7e9bb34352681691c6e7c8fe3f
-
SSDEEP
6144:h0h+V80D4cOyLE6lE/AW2BhkFvKwkZ+eXH+wVM21+rmqmvGIF:h++V80DXOn6luAjh+bwVMMd
Malware Config
Extracted
amadey
4.18
-
install_dir
154561dcbf
-
install_file
Dctooux.exe
-
strings_key
2cd47fa043c815e1a033c67832f3c6a5
-
url_paths
/j4Fvskd3/index.php
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 7 1400 rundll32.exe 9 1928 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exeDctooux.exeDctooux.exepid process 3460 Dctooux.exe 4160 Dctooux.exe 5012 Dctooux.exe 4848 Dctooux.exe 3704 Dctooux.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 4608 rundll32.exe 1400 rundll32.exe 1928 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
Processes:
9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 50 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 900 3328 WerFault.exe 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe 1412 3328 WerFault.exe 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe 4808 3328 WerFault.exe 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe 1424 3328 WerFault.exe 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe 3676 3328 WerFault.exe 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe 3160 3328 WerFault.exe 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe 4812 3328 WerFault.exe 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe 2256 3328 WerFault.exe 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe 3544 3328 WerFault.exe 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe 1352 3328 WerFault.exe 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe 3464 3328 WerFault.exe 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe 3128 3328 WerFault.exe 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe 4044 3328 WerFault.exe 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe 2944 3460 WerFault.exe Dctooux.exe 3096 3460 WerFault.exe Dctooux.exe 5044 3460 WerFault.exe Dctooux.exe 3240 3460 WerFault.exe Dctooux.exe 2728 3460 WerFault.exe Dctooux.exe 4628 3460 WerFault.exe Dctooux.exe 1768 3460 WerFault.exe Dctooux.exe 4140 3460 WerFault.exe Dctooux.exe 2388 3460 WerFault.exe Dctooux.exe 3808 3460 WerFault.exe Dctooux.exe 4088 3460 WerFault.exe Dctooux.exe 4028 3460 WerFault.exe Dctooux.exe 5020 3460 WerFault.exe Dctooux.exe 1080 3460 WerFault.exe Dctooux.exe 2308 3460 WerFault.exe Dctooux.exe 1972 4160 WerFault.exe Dctooux.exe 3272 4160 WerFault.exe Dctooux.exe 2568 4160 WerFault.exe Dctooux.exe 248 4160 WerFault.exe Dctooux.exe 3160 4160 WerFault.exe Dctooux.exe 4812 4160 WerFault.exe Dctooux.exe 1980 4160 WerFault.exe Dctooux.exe 3508 4160 WerFault.exe Dctooux.exe 3636 4160 WerFault.exe Dctooux.exe 4772 4160 WerFault.exe Dctooux.exe 1548 4160 WerFault.exe Dctooux.exe 3704 4160 WerFault.exe Dctooux.exe 3440 4160 WerFault.exe Dctooux.exe 3076 4160 WerFault.exe Dctooux.exe 4088 5012 WerFault.exe Dctooux.exe 444 4160 WerFault.exe Dctooux.exe 1488 4160 WerFault.exe Dctooux.exe 3272 4848 WerFault.exe Dctooux.exe 3636 4160 WerFault.exe Dctooux.exe 4188 4160 WerFault.exe Dctooux.exe 4584 4160 WerFault.exe Dctooux.exe 3192 3704 WerFault.exe Dctooux.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 5108 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3984 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
rundll32.exepowershell.exepid process 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe 3988 powershell.exe 3988 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
taskkill.exepowershell.exedescription pid process Token: SeDebugPrivilege 3984 taskkill.exe Token: SeDebugPrivilege 3988 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exepid process 3328 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exeDctooux.execmd.exeDctooux.exerundll32.exerundll32.exedescription pid process target process PID 3328 wrote to memory of 3460 3328 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe Dctooux.exe PID 3328 wrote to memory of 3460 3328 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe Dctooux.exe PID 3328 wrote to memory of 3460 3328 9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe Dctooux.exe PID 3460 wrote to memory of 2644 3460 Dctooux.exe cmd.exe PID 3460 wrote to memory of 2644 3460 Dctooux.exe cmd.exe PID 3460 wrote to memory of 2644 3460 Dctooux.exe cmd.exe PID 2644 wrote to memory of 3984 2644 cmd.exe taskkill.exe PID 2644 wrote to memory of 3984 2644 cmd.exe taskkill.exe PID 2644 wrote to memory of 3984 2644 cmd.exe taskkill.exe PID 2644 wrote to memory of 5108 2644 cmd.exe timeout.exe PID 2644 wrote to memory of 5108 2644 cmd.exe timeout.exe PID 2644 wrote to memory of 5108 2644 cmd.exe timeout.exe PID 2644 wrote to memory of 4160 2644 cmd.exe Dctooux.exe PID 2644 wrote to memory of 4160 2644 cmd.exe Dctooux.exe PID 2644 wrote to memory of 4160 2644 cmd.exe Dctooux.exe PID 4160 wrote to memory of 4608 4160 Dctooux.exe rundll32.exe PID 4160 wrote to memory of 4608 4160 Dctooux.exe rundll32.exe PID 4160 wrote to memory of 4608 4160 Dctooux.exe rundll32.exe PID 4608 wrote to memory of 1400 4608 rundll32.exe rundll32.exe PID 4608 wrote to memory of 1400 4608 rundll32.exe rundll32.exe PID 1400 wrote to memory of 3240 1400 rundll32.exe netsh.exe PID 1400 wrote to memory of 3240 1400 rundll32.exe netsh.exe PID 1400 wrote to memory of 3988 1400 rundll32.exe powershell.exe PID 1400 wrote to memory of 3988 1400 rundll32.exe powershell.exe PID 4160 wrote to memory of 1928 4160 Dctooux.exe rundll32.exe PID 4160 wrote to memory of 1928 4160 Dctooux.exe rundll32.exe PID 4160 wrote to memory of 1928 4160 Dctooux.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe"C:\Users\Admin\AppData\Local\Temp\9f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3.exe"1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 7722⤵
- Program crash
PID:900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 8202⤵
- Program crash
PID:1412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 8762⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 9402⤵
- Program crash
PID:1424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 9322⤵
- Program crash
PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 9722⤵
- Program crash
PID:3160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 10122⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 10402⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 11402⤵
- Program crash
PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 14762⤵
- Program crash
PID:1352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 8242⤵
- Program crash
PID:3464
-
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 5803⤵
- Program crash
PID:2944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 6203⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 6483⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 7483⤵
- Program crash
PID:3240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 8923⤵
- Program crash
PID:2728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 5963⤵
- Program crash
PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 9203⤵
- Program crash
PID:1768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 9523⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 10163⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 10603⤵
- Program crash
PID:3808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 11683⤵
- Program crash
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 13643⤵
- Program crash
PID:4028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 11403⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 16403⤵
- Program crash
PID:1080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k "taskkill /f /im "Dctooux.exe" && timeout 1 && del "Dctooux.exe" && ren 54a870 Dctooux.exe && C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe && Exit"3⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "Dctooux.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 5525⤵
- Program crash
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 5725⤵
- Program crash
PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 6005⤵
- Program crash
PID:2568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 5525⤵
- Program crash
PID:248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 8205⤵
- Program crash
PID:3160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 8525⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 8445⤵
- Program crash
PID:1980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 8605⤵
- Program crash
PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 8805⤵
- Program crash
PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 11005⤵
- Program crash
PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 11245⤵
- Program crash
PID:1548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 11685⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 13805⤵
- Program crash
PID:3440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 15885⤵
- Program crash
PID:3076
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\netsh.exenetsh wlan show profiles7⤵PID:3240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\280069375290_Desktop.zip' -CompressionLevel Optimal7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 10765⤵
- Program crash
PID:444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 16165⤵
- Program crash
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 17245⤵
- Program crash
PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 11165⤵
- Program crash
PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 11285⤵
- Program crash
PID:4584
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 11363⤵
- Program crash
PID:2308
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 9002⤵
- Program crash
PID:3128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 12882⤵
- Program crash
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3328 -ip 33281⤵PID:2852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 3328 -ip 33281⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3328 -ip 33281⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3328 -ip 33281⤵PID:2588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 3328 -ip 33281⤵PID:1240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3328 -ip 33281⤵PID:2948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3328 -ip 33281⤵PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3328 -ip 33281⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3328 -ip 33281⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3328 -ip 33281⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3328 -ip 33281⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3328 -ip 33281⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3328 -ip 33281⤵PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3460 -ip 34601⤵PID:1272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3460 -ip 34601⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3460 -ip 34601⤵PID:4156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3460 -ip 34601⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3460 -ip 34601⤵PID:2788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3460 -ip 34601⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3460 -ip 34601⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3460 -ip 34601⤵PID:4068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3460 -ip 34601⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3460 -ip 34601⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3460 -ip 34601⤵PID:2052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3460 -ip 34601⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3460 -ip 34601⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3460 -ip 34601⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3460 -ip 34601⤵PID:748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4160 -ip 41601⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4160 -ip 41601⤵PID:2836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4160 -ip 41601⤵PID:1788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4160 -ip 41601⤵PID:1240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4160 -ip 41601⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4160 -ip 41601⤵PID:2060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4160 -ip 41601⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4160 -ip 41601⤵PID:3544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4160 -ip 41601⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4160 -ip 41601⤵PID:2524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4160 -ip 41601⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 4160 -ip 41601⤵PID:3128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4160 -ip 41601⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4160 -ip 41601⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
PID:5012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 4722⤵
- Program crash
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5012 -ip 50121⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4160 -ip 41601⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4160 -ip 41601⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
PID:4848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 4722⤵
- Program crash
PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4848 -ip 48481⤵PID:440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4160 -ip 41601⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4160 -ip 41601⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4160 -ip 41601⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
PID:3704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 4722⤵
- Program crash
PID:3192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 3704 -ip 37041⤵PID:956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
441KB
MD5258e294a16170fba05529bcce0263608
SHA150cc521dd5b5a9aa0e47870bc6dffa651ea7ae34
SHA2569f30da97a5d57aaed356a17e8346988c899f4882e2e3f0156cb5c78951ee4ef3
SHA5127f015af852be227e970e27ad2733fd8eaa076795faad34f01f3615656dcc62b3eae72d63fb2930cac8330917ceb843b30fad2e7e9bb34352681691c6e7c8fe3f
-
Filesize
77KB
MD5b40f60d29a4c5150e9b50a3782987744
SHA1e5dad6114a414243b3ee154f6fae1cfb410a00f5
SHA256481f6bbc4034b5291a9523f234c32a3e322a02729ad0530433247ddcb7d59b75
SHA5121d4171b2d7cd8b4cee09b341fa05010bfdda4ebb169b1c54288c872f1787af94859e7be628c509fdc6ac5488f22b0df81cab5437573b08c48e3a6102ce08144f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
109KB
MD5ca684dc5ebed4381701a39f1cc3a0fb2
SHA18c4a375aa583bd1c705597a7f45fd18934276770
SHA256b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2
SHA5128b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510
-
Filesize
1.2MB
MD54876ee75ce2712147c41ff1277cd2d30
SHA13733dc92318f0c6b92cb201e49151686281acda6
SHA256bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed
SHA5129bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9