Analysis

  • max time kernel
    173s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 10:10

General

  • Target

    f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe

  • Size

    877KB

  • MD5

    5cf30590c99aa762134358dc148a27e5

  • SHA1

    627a0b97c6c2964ac518879412c2773efc191da7

  • SHA256

    f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca

  • SHA512

    223f35d9740e8b7b6e19937b739f61df4ad5f1de38b7e56914eabf58df0450d763bb1c8aea90a11d95374adff6a02cc374603a5fcdc30a99385adff0bdec7a6d

  • SSDEEP

    24576:xyzeIH1htQ79fKIFTycY6wlt608PheVQZxN:kzeShg9fK2nwewK7

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe
    "C:\Users\Admin\AppData\Local\Temp\f9d38578548860b25034aff69de426e59020162ab64834d5c8899353021c57ca.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JE9PA13.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JE9PA13.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IT5cZ21.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IT5cZ21.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4792
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ha4Bj68.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ha4Bj68.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3304
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Px39ut7.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Px39ut7.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1708
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4080
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 552
              6⤵
              • Program crash
              PID:4844
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2FO0840.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2FO0840.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2264
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:4452
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:4168
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 540
                    7⤵
                    • Program crash
                    PID:1656
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 568
                  6⤵
                  • Program crash
                  PID:4768
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3CE08DX.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3CE08DX.exe
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2096
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                  PID:1692
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  5⤵
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  PID:2416
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 584
                  5⤵
                  • Program crash
                  PID:1436
            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ic616YF.exe
              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ic616YF.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4076
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                4⤵
                  PID:32
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 136
                  4⤵
                  • Program crash
                  PID:4444
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uB4gS1.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uB4gS1.exe
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1508
              • C:\Windows\system32\cmd.exe
                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7092.tmp\7093.tmp\7094.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uB4gS1.exe"
                3⤵
                  PID:432
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login
                    4⤵
                      PID:1932
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ff9d13d46f8,0x7ff9d13d4708,0x7ff9d13d4718
                        5⤵
                          PID:4824
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,11848368759346989394,7464561263361240200,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:2
                          5⤵
                            PID:4128
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,11848368759346989394,7464561263361240200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:3
                            5⤵
                              PID:2968
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/
                            4⤵
                            • Enumerates system info in registry
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:5080
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9d13d46f8,0x7ff9d13d4708,0x7ff9d13d4718
                              5⤵
                                PID:2292
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:2
                                5⤵
                                  PID:3780
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:3
                                  5⤵
                                    PID:4412
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:8
                                    5⤵
                                      PID:2928
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2280 /prefetch:1
                                      5⤵
                                        PID:2216
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
                                        5⤵
                                          PID:2352
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:1
                                          5⤵
                                            PID:4220
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:1
                                            5⤵
                                              PID:2932
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:1
                                              5⤵
                                                PID:3628
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:1
                                                5⤵
                                                  PID:2580
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6640 /prefetch:1
                                                  5⤵
                                                    PID:4936
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6552 /prefetch:1
                                                    5⤵
                                                      PID:4276
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:1
                                                      5⤵
                                                        PID:3476
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:8
                                                        5⤵
                                                          PID:3212
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,1711365038353151846,9341772681822111381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:8
                                                          5⤵
                                                            PID:4952
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                                                          4⤵
                                                            PID:5040
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff9d13d46f8,0x7ff9d13d4708,0x7ff9d13d4718
                                                              5⤵
                                                                PID:2100
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,15743899138429910485,4550123373515034266,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:2
                                                                5⤵
                                                                  PID:4968
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,15743899138429910485,4550123373515034266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
                                                                  5⤵
                                                                    PID:708
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1708 -ip 1708
                                                            1⤵
                                                              PID:1212
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2264 -ip 2264
                                                              1⤵
                                                                PID:4984
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4168 -ip 4168
                                                                1⤵
                                                                  PID:3476
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2096 -ip 2096
                                                                  1⤵
                                                                    PID:1852
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4076 -ip 4076
                                                                    1⤵
                                                                      PID:4320
                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                      1⤵
                                                                        PID:1412
                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                        1⤵
                                                                          PID:4440
                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                          1⤵
                                                                            PID:184

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                                                                            Filesize

                                                                            226B

                                                                            MD5

                                                                            916851e072fbabc4796d8916c5131092

                                                                            SHA1

                                                                            d48a602229a690c512d5fdaf4c8d77547a88e7a2

                                                                            SHA256

                                                                            7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                                                                            SHA512

                                                                            07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\66642474-c0db-4625-ad17-16cb1c286476.tmp

                                                                            Filesize

                                                                            11KB

                                                                            MD5

                                                                            ffe0462faa7b2f2abb7ad24dbef217f4

                                                                            SHA1

                                                                            dde93dfc87f6b60dde31dff19b8561b561b09eb6

                                                                            SHA256

                                                                            bf8aab73feb82bec2637c6f03d41df448ce5dabc6189f877f13ea2743faf960f

                                                                            SHA512

                                                                            53821116befd8381b0d85e00231556f9fe0f9a62fb061df0f124d8568c14b9c9a019abfa98a94c22bec3854020580d15879c7c1eedf5c364b3d8b1cc6dfad603

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                            Filesize

                                                                            152B

                                                                            MD5

                                                                            36bb45cb1262fcfcab1e3e7960784eaa

                                                                            SHA1

                                                                            ab0e15841b027632c9e1b0a47d3dec42162fc637

                                                                            SHA256

                                                                            7c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae

                                                                            SHA512

                                                                            02c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                            Filesize

                                                                            152B

                                                                            MD5

                                                                            1e3dc6a82a2cb341f7c9feeaf53f466f

                                                                            SHA1

                                                                            915decb72e1f86e14114f14ac9bfd9ba198fdfce

                                                                            SHA256

                                                                            a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c

                                                                            SHA512

                                                                            0a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                            Filesize

                                                                            6KB

                                                                            MD5

                                                                            81cf4a244e015224cb48acbc2c1aebe1

                                                                            SHA1

                                                                            e5675c5e44e2db760b01963378642cd06f5745a4

                                                                            SHA256

                                                                            7c1c87eefdad32cc4aec0ff5cc48a6e063e9c3a5285e70b1eb53c5345cde5533

                                                                            SHA512

                                                                            ced81f435c124c0dc1d3565f6ea57b992d4a7c274ec6f12bca080a1cc720be694bd666252c6bb29c84ca03188c31c39fe2e7afbc41eae2c40770afc848b9980a

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                            Filesize

                                                                            7KB

                                                                            MD5

                                                                            8073c698e313e8a74636b2179575d642

                                                                            SHA1

                                                                            2d9f13a14d74704f11ac016f4b4aee6b77b6ebf1

                                                                            SHA256

                                                                            27f1d87c8cef6d722fc4e78eaeaf28021c52941c4c6bfab275c74be907d8e862

                                                                            SHA512

                                                                            62cade8a2c893f5a48317cdbdeb7d9a6acf706152018c0ba850de78f99062e75294c1dfacc263995944fc771e47a263c348aacc53597065d74e96e8f4d6aed2d

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                            Filesize

                                                                            7KB

                                                                            MD5

                                                                            6d5bba0422001dff0a1b5162c409513c

                                                                            SHA1

                                                                            847da3eee74647f953c59b6f718d9225062bcc8b

                                                                            SHA256

                                                                            ead7fa599b4139736db9ebc25126b6b5f57500595d40204483fc0aab06381df2

                                                                            SHA512

                                                                            422800f16892c55dfba0d951ee5320b6dacb7490c693a81d21b33094e31ec5aa108508a339f710d29585a73fc6952d8751fb2bad6a292f7ef1213c40735cff25

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                            Filesize

                                                                            16B

                                                                            MD5

                                                                            6752a1d65b201c13b62ea44016eb221f

                                                                            SHA1

                                                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                            SHA256

                                                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                            SHA512

                                                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            5cc0d69525a71d366c58aa49aab20269

                                                                            SHA1

                                                                            52f1d774c485ca7c271f0ec8c99fe16713b79bb2

                                                                            SHA256

                                                                            626e343ed319cd174d3e265cf4be824dc09d00be2136d528721c841906107d2b

                                                                            SHA512

                                                                            1b16154d12422c7de596cd3ba15f9f12725fb375df938a547d3353efac2a5ac7fdba2ca8749ec0ac8d2d88724c0bad9cd0d455835a40f2021ef4f3e2089c293b

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            4a0cfbe536e29336c1768a58f98f1223

                                                                            SHA1

                                                                            8a86e1df01d7519dfc36451e1b24bf43cced9faf

                                                                            SHA256

                                                                            f596341f655f5a12e9de647e3911068309d90990a455a715e6b59f32f4f583ca

                                                                            SHA512

                                                                            5d1e9ced50d6fbea506d2dccfd4d386f46675cf38de5baefa925641d39e06af7fc3d432eeb85202182c4ce458b36de7c665346b7f5f5fd1213ad29486b53bee2

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            86ea2d1fd8b05207a8853c160ac4ca43

                                                                            SHA1

                                                                            64a6fd3af030a36fc4f91a3d781d4dc007826dc7

                                                                            SHA256

                                                                            66623094c26e8323afee8d01d82d76aa9311d7e10d2f0f91388dec816093a57e

                                                                            SHA512

                                                                            437c9c5d4d1e0a0130a7fdac56d19b932d55e12c3c837dbcb0ca139e6cb17f62956cc7d014bc25d2f77850e69d7675caf8c38bf4a5443cee76690c1368626c7d

                                                                          • C:\Users\Admin\AppData\Local\Temp\7092.tmp\7093.tmp\7094.bat

                                                                            Filesize

                                                                            124B

                                                                            MD5

                                                                            dec89e5682445d71376896eac0d62d8b

                                                                            SHA1

                                                                            c5ae3197d3c2faf3dea137719c804ab215022ea6

                                                                            SHA256

                                                                            c3dea90ca98985007f0de66bf0197fdcd2d4a35e365135bf37a18a4895d81668

                                                                            SHA512

                                                                            b746b79120d2ff8a9f3327b0bed99c70339155ea831c1eb9f412056fc8de36a0e3005378ba9102bd25ce6cc24fe1171f1a9c8453f33a9bcd6dd59e9ad0f8e186

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uB4gS1.exe

                                                                            Filesize

                                                                            87KB

                                                                            MD5

                                                                            06f8b4b3dfe7a2ed9534f78765e5c623

                                                                            SHA1

                                                                            43964ba962303ff5dbe3f3b2d0ccb6088ae7931a

                                                                            SHA256

                                                                            0273130e9b225c0c4d1772535a382e27d79bd0de807ad537aa305b129c517bc2

                                                                            SHA512

                                                                            2844f324b8c9e86cf312d5e66c580d069f386a255455f087f3ab146cb6db5d5da3aad45962e826345f2ee67b6b8d19cc30da9e58ca310e8eaddc89f4bb7f42f5

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JE9PA13.exe

                                                                            Filesize

                                                                            739KB

                                                                            MD5

                                                                            24dc758b8982a91afe8563dc9b6505b9

                                                                            SHA1

                                                                            9dc6312ae33de5a8294c76bd32a50354659d1c1c

                                                                            SHA256

                                                                            e93482911cdbbb2670d4b4692a8ef5b479b56647308309776d38e8e4640e81bf

                                                                            SHA512

                                                                            2e736897e8dd637d25b2eb812fc2a2ae60f31bf778dde1a61d8dee3979a6efe4d8678ca03b3c4a76c9cd863256f1946388dc93dbe46695ecd7c07c003855886e

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ic616YF.exe

                                                                            Filesize

                                                                            339KB

                                                                            MD5

                                                                            b6065a3e30887f2c4bf46c81437f8db8

                                                                            SHA1

                                                                            3ee2c9352894427de00093e4686597cfca21abbc

                                                                            SHA256

                                                                            c22d72bdc936010e01f24d4e5d429139ad7826846ca4652ebb664e73832e2a4f

                                                                            SHA512

                                                                            52397a06d938cc2f21584b32414049faeb717d658ed8dd4ff6c07b8ee8bb9a084cbf0887a0eccfbe1a05d37d65214faf43c96a0da063ae5ba53f9caf93f27a6b

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IT5cZ21.exe

                                                                            Filesize

                                                                            503KB

                                                                            MD5

                                                                            68c126c0483a85333bc96d631c116142

                                                                            SHA1

                                                                            9992f54d0126ebfdb5f5cb90d91d2b48351eed6b

                                                                            SHA256

                                                                            74f32a5232a45f65d671660dc3177c701c85de2500113b7195a96a4d97af2df0

                                                                            SHA512

                                                                            b9942372b9b32191dbee459d6399d7cb91451df33691f99078706832d29d0fc1f3755f39b38ac54c0156e50a264d9120e20aec7f1ad30bfcaeae10a187d76f3f

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3CE08DX.exe

                                                                            Filesize

                                                                            148KB

                                                                            MD5

                                                                            aa52fdd2418c834d99276c985fdbaf1a

                                                                            SHA1

                                                                            c56dc824babf8d0d53e809d5d0db680a37a02f63

                                                                            SHA256

                                                                            50ba13ac3e6f1ea5a91a0c62d1829fe9bdcb03d098018ad094088f67b7a80f38

                                                                            SHA512

                                                                            69418c5d5d0e3c0099e4eb026211a674a6ea14af0d6b9821456bf0df6948ea9ce61bcdcf95d84077875c795535fa58169d397d8b7f46a09c8ef9d57829680c41

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ha4Bj68.exe

                                                                            Filesize

                                                                            317KB

                                                                            MD5

                                                                            1e71d0be349396195913d65c7a46339a

                                                                            SHA1

                                                                            d6237a9c9ff2bdf96bea08707fa5605f3f88c501

                                                                            SHA256

                                                                            90df95b4584663dd13009aeacca9648600a0bb6daea1bc78ce397020b6753b57

                                                                            SHA512

                                                                            e24511b4e83d1f4eeb571343ef5a55bfb9e809eb2a0d2684c7156101324a296bc7635a42520452fafdc27e65845fd02da3bb095fa67b8ec71bb1f8b5e7393a5b

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Px39ut7.exe

                                                                            Filesize

                                                                            129KB

                                                                            MD5

                                                                            4ed940ea493451635145489ffbdec386

                                                                            SHA1

                                                                            4b5d0ba229b8ac04f753864c1170da0070673e35

                                                                            SHA256

                                                                            b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa

                                                                            SHA512

                                                                            8feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2FO0840.exe

                                                                            Filesize

                                                                            298KB

                                                                            MD5

                                                                            39a77dd444d335e91b247aa7cd8a3ca1

                                                                            SHA1

                                                                            8b97ae2fe569679ac5f641c46eb2d3c8e8b37971

                                                                            SHA256

                                                                            2b800882ff65ee4010d5fcbbd38330c4ce0c817afd53060523311cd87e7c082d

                                                                            SHA512

                                                                            f407040ae1dc453a96ef10d06d694208ea0bb6374e4ac243be85da42abdd0f085a8f88d623c3104c4dcc09b5b220a0235bbe46035ebe08dfa599cd58017da119

                                                                          • memory/32-59-0x00000000080B0000-0x0000000008654000-memory.dmp

                                                                            Filesize

                                                                            5.6MB

                                                                          • memory/32-58-0x0000000074350000-0x0000000074B00000-memory.dmp

                                                                            Filesize

                                                                            7.7MB

                                                                          • memory/32-60-0x0000000007BE0000-0x0000000007C72000-memory.dmp

                                                                            Filesize

                                                                            584KB

                                                                          • memory/32-61-0x0000000007BC0000-0x0000000007BD0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/32-62-0x0000000007D80000-0x0000000007D8A000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/32-56-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                            Filesize

                                                                            248KB

                                                                          • memory/32-67-0x0000000008C80000-0x0000000009298000-memory.dmp

                                                                            Filesize

                                                                            6.1MB

                                                                          • memory/32-68-0x0000000007F20000-0x000000000802A000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/32-69-0x0000000007E50000-0x0000000007E62000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/32-70-0x0000000007EB0000-0x0000000007EEC000-memory.dmp

                                                                            Filesize

                                                                            240KB

                                                                          • memory/32-71-0x0000000008030000-0x000000000807C000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/32-157-0x0000000007BC0000-0x0000000007BD0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/32-140-0x0000000074350000-0x0000000074B00000-memory.dmp

                                                                            Filesize

                                                                            7.7MB

                                                                          • memory/2416-45-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                            Filesize

                                                                            36KB

                                                                          • memory/2416-44-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                            Filesize

                                                                            36KB

                                                                          • memory/2416-47-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                            Filesize

                                                                            36KB

                                                                          • memory/3436-46-0x0000000002580000-0x0000000002596000-memory.dmp

                                                                            Filesize

                                                                            88KB

                                                                          • memory/4080-34-0x00000000746E0000-0x0000000074E90000-memory.dmp

                                                                            Filesize

                                                                            7.7MB

                                                                          • memory/4080-30-0x00000000746E0000-0x0000000074E90000-memory.dmp

                                                                            Filesize

                                                                            7.7MB

                                                                          • memory/4080-29-0x00000000746E0000-0x0000000074E90000-memory.dmp

                                                                            Filesize

                                                                            7.7MB

                                                                          • memory/4080-28-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/4168-40-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                            Filesize

                                                                            200KB

                                                                          • memory/4168-38-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                            Filesize

                                                                            200KB

                                                                          • memory/4168-37-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                            Filesize

                                                                            200KB

                                                                          • memory/4168-36-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                            Filesize

                                                                            200KB