Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe
-
Size
93KB
-
MD5
f64a83456bc601bb3aeebfdc6094057a
-
SHA1
dd117d3c5b1051c12abe3e521ac2c0e28caaa646
-
SHA256
121cf6c76608b2554ad1566c64ec8c0350d123b156cb8bd61fd7c35574958066
-
SHA512
42e791a94a22402ea428962888926cb086704d3c6888e9e12bd8f5ad2781bf9632cae1a6fd351795123c8d8bba83d8c8a4fab6c91a73508ba7927394d391789a
-
SSDEEP
1536:dOCc/KRA9EMj3IBAgVfiSTfSA8ZrggRK2AhFn+okzhF5mG4ffabCbn6cdsIlU7K+:dOCcCRjMkAgVfLTfx6rgeq8L5F0fpnjO
Malware Config
Extracted
xtremerat
turkoteste.no-ip.org
Signatures
-
Detect XtremeRAT payload 24 IoCs
Processes:
resource yara_rule behavioral2/memory/1776-24-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/1776-25-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2612-26-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2612-27-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4700-36-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4700-37-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2524-47-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2524-48-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3408-57-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3408-58-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3224-66-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3224-67-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3280-74-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3280-75-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/1496-76-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/1496-77-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2864-86-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2864-87-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4696-96-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4696-98-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/856-107-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/856-109-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4844-118-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4844-120-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\hKrPKybp.exe" reg.exe -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Processes:
resource yara_rule behavioral2/memory/1776-18-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1776-19-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1776-20-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1776-22-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1776-24-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1776-25-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2612-26-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2612-27-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4700-36-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4700-37-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2524-47-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2524-48-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3408-57-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3408-58-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3224-66-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3224-67-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3280-73-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3280-74-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3280-75-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1496-76-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1496-77-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2864-86-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2864-87-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4696-96-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4696-98-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/856-107-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/856-109-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4844-118-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4844-120-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hKrPKybp.exe" f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe -
Suspicious use of SetThreadContext 10 IoCs
Processes:
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exedescription pid process target process PID 1228 set thread context of 1776 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 set thread context of 5004 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 set thread context of 3508 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 set thread context of 2992 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 set thread context of 1884 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 set thread context of 3280 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 set thread context of 628 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 set thread context of 3628 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 set thread context of 4328 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 set thread context of 3616 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe -
Program crash 20 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3060 2612 WerFault.exe svchost.exe 3192 2612 WerFault.exe svchost.exe 2140 4700 WerFault.exe svchost.exe 4348 4700 WerFault.exe svchost.exe 2468 2524 WerFault.exe svchost.exe 3404 2524 WerFault.exe svchost.exe 4656 3408 WerFault.exe svchost.exe 716 3408 WerFault.exe svchost.exe 1984 3224 WerFault.exe svchost.exe 3912 3224 WerFault.exe svchost.exe 1780 1496 WerFault.exe svchost.exe 4024 1496 WerFault.exe svchost.exe 552 2864 WerFault.exe svchost.exe 3092 2864 WerFault.exe svchost.exe 2980 4696 WerFault.exe svchost.exe 4948 4696 WerFault.exe svchost.exe 3248 856 WerFault.exe svchost.exe 1620 856 WerFault.exe svchost.exe 1432 4844 WerFault.exe svchost.exe 2356 4844 WerFault.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exepid process 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.execsc.execmd.exevbc.exevbc.exevbc.exedescription pid process target process PID 1228 wrote to memory of 2992 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe csc.exe PID 1228 wrote to memory of 2992 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe csc.exe PID 1228 wrote to memory of 2992 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe csc.exe PID 2992 wrote to memory of 4768 2992 csc.exe cvtres.exe PID 2992 wrote to memory of 4768 2992 csc.exe cvtres.exe PID 2992 wrote to memory of 4768 2992 csc.exe cvtres.exe PID 1228 wrote to memory of 1776 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 1776 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 1776 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 1776 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 1776 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 1776 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 1776 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 1776 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 4956 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe cmd.exe PID 1228 wrote to memory of 4956 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe cmd.exe PID 1228 wrote to memory of 4956 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe cmd.exe PID 4956 wrote to memory of 4248 4956 cmd.exe reg.exe PID 4956 wrote to memory of 4248 4956 cmd.exe reg.exe PID 4956 wrote to memory of 4248 4956 cmd.exe reg.exe PID 1776 wrote to memory of 2612 1776 vbc.exe svchost.exe PID 1776 wrote to memory of 2612 1776 vbc.exe svchost.exe PID 1776 wrote to memory of 2612 1776 vbc.exe svchost.exe PID 1776 wrote to memory of 2612 1776 vbc.exe svchost.exe PID 1776 wrote to memory of 3304 1776 vbc.exe msedge.exe PID 1776 wrote to memory of 3304 1776 vbc.exe msedge.exe PID 1776 wrote to memory of 3304 1776 vbc.exe msedge.exe PID 1228 wrote to memory of 5004 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 5004 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 5004 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 5004 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 5004 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 5004 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 5004 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 5004 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 5004 wrote to memory of 4700 5004 vbc.exe svchost.exe PID 5004 wrote to memory of 4700 5004 vbc.exe svchost.exe PID 5004 wrote to memory of 4700 5004 vbc.exe svchost.exe PID 5004 wrote to memory of 4700 5004 vbc.exe svchost.exe PID 5004 wrote to memory of 1724 5004 vbc.exe msedge.exe PID 5004 wrote to memory of 1724 5004 vbc.exe msedge.exe PID 5004 wrote to memory of 1724 5004 vbc.exe msedge.exe PID 1228 wrote to memory of 3508 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 3508 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 3508 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 3508 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 3508 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 3508 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 3508 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 3508 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 3508 wrote to memory of 2524 3508 vbc.exe svchost.exe PID 3508 wrote to memory of 2524 3508 vbc.exe svchost.exe PID 3508 wrote to memory of 2524 3508 vbc.exe svchost.exe PID 3508 wrote to memory of 2524 3508 vbc.exe svchost.exe PID 3508 wrote to memory of 1568 3508 vbc.exe msedge.exe PID 3508 wrote to memory of 1568 3508 vbc.exe msedge.exe PID 3508 wrote to memory of 1568 3508 vbc.exe msedge.exe PID 1228 wrote to memory of 2992 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 2992 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 2992 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 2992 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 2992 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 2992 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1228 wrote to memory of 2992 1228 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0d9byk1i.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES320D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC320C.tmp"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 4804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 4884⤵
- Program crash
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d explorer.exe,"C:\Users\Admin\AppData\Local\Temp\hKrPKybp.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d explorer.exe,"C:\Users\Admin\AppData\Local\Temp\hKrPKybp.exe"3⤵
- Modifies WinLogon for persistence
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 4804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 5004⤵
- Program crash
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 4804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 5044⤵
- Program crash
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 4324⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 5004⤵
- Program crash
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 4804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 5044⤵
- Program crash
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 4804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 5044⤵
- Program crash
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 4804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 5044⤵
- Program crash
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 4804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 5044⤵
- Program crash
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 4964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 5164⤵
- Program crash
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 4804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 5044⤵
- Program crash
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2612 -ip 26121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2612 -ip 26121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4700 -ip 47001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4700 -ip 47001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2524 -ip 25241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2524 -ip 25241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3408 -ip 34081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3408 -ip 34081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3224 -ip 32241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3224 -ip 32241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1496 -ip 14961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 1496 -ip 14961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2864 -ip 28641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2864 -ip 28641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4696 -ip 46961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4696 -ip 46961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 856 -ip 8561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 856 -ip 8561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4844 -ip 48441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 4844 -ip 48441⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0d9byk1i.dllFilesize
180KB
MD53441d0c023ba0a42bb8b7d17cc3a2e37
SHA14f29e55787305a48636e12fdff839b571e2367f3
SHA256c1f4248cde000b3a15dbc1c0cd457a950a813089e72d6926a0d4a3ccb584d14e
SHA5128d35b20fa3ece88382899d2fd2e7549b164cd7a4bea9531e17bc6569d50ee12507b190df6856a7de67715b3a7e635617fc87642fb7e495d132c755cb386da9ce
-
C:\Users\Admin\AppData\Local\Temp\RES320D.tmpFilesize
1KB
MD56605f941480b80967dab3eb1475976bc
SHA18206a451c1b76a249065b496b970117dc25eb4b7
SHA2565d25d9063ae75cacbd247b8eda51f1ddc2d803e6f90b1e3ed46e5578d7ab6955
SHA5123f554a8eb14113307283517e00422b4573a70fe81737e62e1d95d8828a4cdac843d285045aa46313f8b60ae436e2d57bb916aa964f53eb4595f153d901a8ec72
-
\??\c:\Users\Admin\AppData\Local\Temp\0d9byk1i.cmdlineFilesize
196B
MD5c0255f0e763d21096d96cfb1587df13a
SHA19d5cf9e5e3972fc3f54f231914012e668ab51ed5
SHA256f43edb2ce32b48ac5b6ef4344fb62503c6244c7a223c9a3b6759476713334af4
SHA5127522202c8da416554ac90ecb3b2178c1ea3068447a015b508ae8de964a1cc38fe3beb34048ca463a1fe4bbbd1f5f12b225a06062abc933cf0d9d3a324b174f1c
-
\??\c:\Users\Admin\AppData\Local\Temp\CSC320C.tmpFilesize
652B
MD54220bd672f12242707b33419392957c4
SHA16df18eeb80ff43b7e93c086a07c06068da83c18e
SHA25656c367dcf1bfd8f433943f40b9b817519f0285064e4b56a82944b1a7c74d4d6c
SHA51201ecbee30ee93cecb2bee043887410554d3fce6d025134f1d8f412aae5eda3b82ebaff55f864a3b26862046e38aced980e77326cbc8fb7933301f9f41b177457
-
\??\c:\Users\Admin\AppData\Local\Temp\tmp30F3.tmp.txtFilesize
82KB
MD5ad9c893a0c6c4d7e294fd49128b800b1
SHA153f9fb024d7aee77abf25f7a5e45ab7e3f4b740c
SHA25609698cf156fe094e7344b3d782fb76cccc023ae90c8a809cd209f762131198c5
SHA51203641922120114044d63a312dc309de67351de631e0cba396100781e8a009fb7ac309c5bdcbcb3a38fdfe4a8a413c9912e5b40b9b9ef7d12a3caadbdb9fd07be
-
memory/856-109-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/856-107-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/1228-28-0x0000000074820000-0x0000000074DD1000-memory.dmpFilesize
5.7MB
-
memory/1228-1-0x00000000013E0000-0x00000000013F0000-memory.dmpFilesize
64KB
-
memory/1228-2-0x0000000074820000-0x0000000074DD1000-memory.dmpFilesize
5.7MB
-
memory/1228-0-0x0000000074820000-0x0000000074DD1000-memory.dmpFilesize
5.7MB
-
memory/1228-39-0x0000000074820000-0x0000000074DD1000-memory.dmpFilesize
5.7MB
-
memory/1496-76-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/1496-77-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/1776-20-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/1776-25-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/1776-24-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/1776-22-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/1776-19-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/1776-18-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2524-48-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2524-47-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2612-27-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2612-26-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2864-87-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2864-86-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2992-9-0x0000000000620000-0x0000000000630000-memory.dmpFilesize
64KB
-
memory/3224-66-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/3224-67-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/3280-74-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/3280-75-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/3280-73-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/3408-58-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/3408-57-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/4696-96-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/4696-98-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/4700-37-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/4700-36-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/4844-118-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/4844-120-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB