Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe
Resource
win10v2004-20240508-en
General
-
Target
d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe
-
Size
224KB
-
MD5
57af7fd9485f2d2f5fc279a69339d175
-
SHA1
6185c0f02f629fc1ce39fe89e3d39afafb25880d
-
SHA256
d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716
-
SHA512
caca3f3bc3d685dc865227a92947e16ac30363158161835ef8d57ad534907749cf940cb8bf4b0a8bdec14a8eb67a08975103cbebc8cbc7e7f7a2c968a40030d0
-
SSDEEP
6144:qW27moZmSCE4f9FIUpOVw86CmOJfTo9FIUIhrcflDML:qW2Sv0aAD6RrI1+lDML
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hcifgjgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hiekid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Icbimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpmgqnfl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hiekid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hgilchkf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjjddchg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcifgjgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hpmgqnfl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgilchkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hjjddchg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ihoafpmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpapln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hpapln32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icbimi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihoafpmp.exe -
Executes dropped EXE 9 IoCs
pid Process 2896 Hcifgjgc.exe 2836 Hpmgqnfl.exe 2652 Hiekid32.exe 2508 Hgilchkf.exe 2708 Hpapln32.exe 2556 Hjjddchg.exe 1644 Icbimi32.exe 1680 Ihoafpmp.exe 2572 Iagfoe32.exe -
Loads dropped DLL 22 IoCs
pid Process 2060 d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe 2060 d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe 2896 Hcifgjgc.exe 2896 Hcifgjgc.exe 2836 Hpmgqnfl.exe 2836 Hpmgqnfl.exe 2652 Hiekid32.exe 2652 Hiekid32.exe 2508 Hgilchkf.exe 2508 Hgilchkf.exe 2708 Hpapln32.exe 2708 Hpapln32.exe 2556 Hjjddchg.exe 2556 Hjjddchg.exe 1644 Icbimi32.exe 1644 Icbimi32.exe 1680 Ihoafpmp.exe 1680 Ihoafpmp.exe 2248 WerFault.exe 2248 WerFault.exe 2248 WerFault.exe 2248 WerFault.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Hpmgqnfl.exe Hcifgjgc.exe File created C:\Windows\SysWOW64\Ihoafpmp.exe Icbimi32.exe File opened for modification C:\Windows\SysWOW64\Ihoafpmp.exe Icbimi32.exe File opened for modification C:\Windows\SysWOW64\Iagfoe32.exe Ihoafpmp.exe File opened for modification C:\Windows\SysWOW64\Hpapln32.exe Hgilchkf.exe File created C:\Windows\SysWOW64\Glqllcbf.dll Hgilchkf.exe File opened for modification C:\Windows\SysWOW64\Hjjddchg.exe Hpapln32.exe File created C:\Windows\SysWOW64\Icbimi32.exe Hjjddchg.exe File created C:\Windows\SysWOW64\Amammd32.dll Icbimi32.exe File created C:\Windows\SysWOW64\Hgpdcgoc.dll Hcifgjgc.exe File opened for modification C:\Windows\SysWOW64\Hiekid32.exe Hpmgqnfl.exe File created C:\Windows\SysWOW64\Mhfkbo32.dll Hpapln32.exe File created C:\Windows\SysWOW64\Ecmkgokh.dll Hjjddchg.exe File created C:\Windows\SysWOW64\Hcifgjgc.exe d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe File opened for modification C:\Windows\SysWOW64\Hcifgjgc.exe d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe File opened for modification C:\Windows\SysWOW64\Hgilchkf.exe Hiekid32.exe File created C:\Windows\SysWOW64\Gknfklng.dll Hpmgqnfl.exe File created C:\Windows\SysWOW64\Hgilchkf.exe Hiekid32.exe File created C:\Windows\SysWOW64\Nbniiffi.dll Hiekid32.exe File created C:\Windows\SysWOW64\Hpapln32.exe Hgilchkf.exe File created C:\Windows\SysWOW64\Hpmgqnfl.exe Hcifgjgc.exe File created C:\Windows\SysWOW64\Iagfoe32.exe Ihoafpmp.exe File created C:\Windows\SysWOW64\Gjenmobn.dll Ihoafpmp.exe File created C:\Windows\SysWOW64\Hiekid32.exe Hpmgqnfl.exe File created C:\Windows\SysWOW64\Hjjddchg.exe Hpapln32.exe File opened for modification C:\Windows\SysWOW64\Icbimi32.exe Hjjddchg.exe File created C:\Windows\SysWOW64\Fealjk32.dll d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2248 2572 WerFault.exe 36 -
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fealjk32.dll" d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hiekid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecmkgokh.dll" Hjjddchg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Icbimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gknfklng.dll" Hpmgqnfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hiekid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbniiffi.dll" Hiekid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glqllcbf.dll" Hgilchkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhfkbo32.dll" Hpapln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgpdcgoc.dll" Hcifgjgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hpmgqnfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hpapln32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hcifgjgc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hgilchkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hjjddchg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hpapln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amammd32.dll" Icbimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ihoafpmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hcifgjgc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hjjddchg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjenmobn.dll" Ihoafpmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hpmgqnfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hgilchkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Icbimi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ihoafpmp.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2896 2060 d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe 28 PID 2060 wrote to memory of 2896 2060 d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe 28 PID 2060 wrote to memory of 2896 2060 d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe 28 PID 2060 wrote to memory of 2896 2060 d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe 28 PID 2896 wrote to memory of 2836 2896 Hcifgjgc.exe 29 PID 2896 wrote to memory of 2836 2896 Hcifgjgc.exe 29 PID 2896 wrote to memory of 2836 2896 Hcifgjgc.exe 29 PID 2896 wrote to memory of 2836 2896 Hcifgjgc.exe 29 PID 2836 wrote to memory of 2652 2836 Hpmgqnfl.exe 30 PID 2836 wrote to memory of 2652 2836 Hpmgqnfl.exe 30 PID 2836 wrote to memory of 2652 2836 Hpmgqnfl.exe 30 PID 2836 wrote to memory of 2652 2836 Hpmgqnfl.exe 30 PID 2652 wrote to memory of 2508 2652 Hiekid32.exe 31 PID 2652 wrote to memory of 2508 2652 Hiekid32.exe 31 PID 2652 wrote to memory of 2508 2652 Hiekid32.exe 31 PID 2652 wrote to memory of 2508 2652 Hiekid32.exe 31 PID 2508 wrote to memory of 2708 2508 Hgilchkf.exe 32 PID 2508 wrote to memory of 2708 2508 Hgilchkf.exe 32 PID 2508 wrote to memory of 2708 2508 Hgilchkf.exe 32 PID 2508 wrote to memory of 2708 2508 Hgilchkf.exe 32 PID 2708 wrote to memory of 2556 2708 Hpapln32.exe 33 PID 2708 wrote to memory of 2556 2708 Hpapln32.exe 33 PID 2708 wrote to memory of 2556 2708 Hpapln32.exe 33 PID 2708 wrote to memory of 2556 2708 Hpapln32.exe 33 PID 2556 wrote to memory of 1644 2556 Hjjddchg.exe 34 PID 2556 wrote to memory of 1644 2556 Hjjddchg.exe 34 PID 2556 wrote to memory of 1644 2556 Hjjddchg.exe 34 PID 2556 wrote to memory of 1644 2556 Hjjddchg.exe 34 PID 1644 wrote to memory of 1680 1644 Icbimi32.exe 35 PID 1644 wrote to memory of 1680 1644 Icbimi32.exe 35 PID 1644 wrote to memory of 1680 1644 Icbimi32.exe 35 PID 1644 wrote to memory of 1680 1644 Icbimi32.exe 35 PID 1680 wrote to memory of 2572 1680 Ihoafpmp.exe 36 PID 1680 wrote to memory of 2572 1680 Ihoafpmp.exe 36 PID 1680 wrote to memory of 2572 1680 Ihoafpmp.exe 36 PID 1680 wrote to memory of 2572 1680 Ihoafpmp.exe 36 PID 2572 wrote to memory of 2248 2572 Iagfoe32.exe 37 PID 2572 wrote to memory of 2248 2572 Iagfoe32.exe 37 PID 2572 wrote to memory of 2248 2572 Iagfoe32.exe 37 PID 2572 wrote to memory of 2248 2572 Iagfoe32.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe"C:\Users\Admin\AppData\Local\Temp\d1d4631bedf1d1a950e301b6c32fab15d9e8d5ecd19aabd650bc1199e6996716.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\Hcifgjgc.exeC:\Windows\system32\Hcifgjgc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\Hpmgqnfl.exeC:\Windows\system32\Hpmgqnfl.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\Hiekid32.exeC:\Windows\system32\Hiekid32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\Hgilchkf.exeC:\Windows\system32\Hgilchkf.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Hpapln32.exeC:\Windows\system32\Hpapln32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\Hjjddchg.exeC:\Windows\system32\Hjjddchg.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\Icbimi32.exeC:\Windows\system32\Icbimi32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\Ihoafpmp.exeC:\Windows\system32\Ihoafpmp.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\Iagfoe32.exeC:\Windows\system32\Iagfoe32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 14011⤵
- Loads dropped DLL
- Program crash
PID:2248
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD52273622f3801457d5084b699abf4dd4c
SHA172c374164152c15ecb8ca0bdda7694a9205afe21
SHA25697f3beda90cd074434054c4c7a3bd5ff96e5276fddef4240e4db3b9c1c1b8ca8
SHA512a055c62a1b60cf388a515a721c7378328158f680ffeb7afc8c3099f0bd2c725012e0d561265538ff716a34e77b88ec0bf1adba2f2e4d589d0b6a5b4122bf1ed7
-
Filesize
224KB
MD58c85906f1623e8cbd4b07f6e2a7fd187
SHA13dda2ce7636bef39f40c27a8b97f0dec8e58e94b
SHA2564ffcae4b3d0bd76b13e5f378efa4738846ced6c16dff8bdf1909c260fe036e5f
SHA51239b59c7f49de1f3639614376c5d989d845b076c46d6a39c477aae4a0d5d488139585ef384c9ec015ed2b435564387d95416de92e0d18d893ff774e603d0fa7e5
-
Filesize
224KB
MD587b835d550d139c7441a74d4d99475ce
SHA1a9d0f1aa577257196392678102b2955f111fdea6
SHA2563cb4d21681f4c693c4922afae8134bc432a5372aa226077e8c66e68e663f5668
SHA51233c454d6a9a09221de4b1ce4c7260f1eeb0a50182f58becb034bcc2dd351ccfce7f47c9042c21232962d1f1d19778986c5433c114e1847352208fa514dfc8d8b
-
Filesize
224KB
MD5d1e2d852b4f9be692247870b9301c1db
SHA116bfc202be839c5fd6a5e93af9902af31c16ee52
SHA2564c7487ea3a3f865619426c63db4cab98dd611f53b5aaf25ccc45bc2de9e97bbb
SHA5124f6b53a266ad300580b967484fa2ca7aaead407e5f59b647dd6679673ded1758ff46a8cc0dee0e9ec235755cd36cda33edda44be3abd3722a2554f95bde00373
-
Filesize
224KB
MD5aeb1223fc95e36f2b10b0e3b487b8420
SHA1976920c024058a412e63f0238667f152ed56949f
SHA256f68e1e15268f2b7f19b73344297be80c268c3642cdc800d41d08be4189c5ae35
SHA5124c88b1db13e7c1a7f28612b06b45fa8b5008a898c0d8029962144f2241982defffeae1a12fe2b97e14d2e561a038fcec139943d974f9b50eec6ecab666bf2325
-
Filesize
224KB
MD50f24a545ce591e3c33498f3df4419f49
SHA113c4692ceeb7b8f5b579a875d89242b65bc5858a
SHA256dfa759901b1d58df3d3ed4a4a342151ec8755044a7b4e47e56f504eb35c016a0
SHA512e7e2decdabdc6c549380006a74444f32351c61955dad251baf1c6ec4d8e5e8aff09eca8f6f02be36dc994dbfe74e1c7fd3b2da32c26b086a7c9aeb2fec759b24
-
Filesize
224KB
MD5d2380f75a51c4118c7a3d81d98067b42
SHA1bf0f6f86e0a827430973a18c4d642a6fedb0b476
SHA25604c47b5143092e04f86e81b4029b86764856a65c6a8244792f73609badea71bc
SHA5127fe94ac0165b9398c618ed7f8d4211d7bb948112a789454340f85752b8606e59c1db5fd135d82101d8ddce619adab5114f340590e9f34bc9c065dfe7acaf9c4f
-
Filesize
224KB
MD5eeea6fe15e606819c9bee67ba04804c6
SHA14abfb0058f86ecc24322626310fccbccbca87392
SHA2564aa735131027d3a21f1df01918d856d5df10127fdd4be9539e1c8aec9b02c16a
SHA51236e6104e8917d686c256b51846fdf779e184d9ad5c6636214e872903ab1559bfa3594411a188750c35789e945075817705c5d2f49ea309c96f7a0053272b08ad
-
Filesize
224KB
MD5e6a7ce124625abf7dc4fd1a76dcfd712
SHA15cd40ded9eed9711d518a48868051a5461463bc2
SHA256d586a1906f874164ca023007b88586f98789b930d85648b9717382189f165724
SHA512481427b1c02242908779437cbb8a27af38b9c5eb2ecf61da30d923b0a3b7701e7cde0db39a9d82e13db2f7ec5953ef8b29cb16c54eb1df7ed3574bec6bf8f3bd
-
Filesize
224KB
MD530048ea7acfd115a74cbd37171b4f8cf
SHA12b4c4e7b96eeacf57fb1b61472e8a033f8b65191
SHA256ec88d8c9242ec7965e91611f02105c8f8784efa356d7418c0106691100967b41
SHA512896ecfb82ef1bec5c1630f06127dd45b1f6e39f8b185a7cd142c863130d46317199f76286892dc3f3625ce1e2e27957b7818655699c541a9b0d903fbb7016e8a