Analysis

  • max time kernel
    149s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 03:17

General

  • Target

    f0288bf4853d925b2d32556d1c443bf6f81516a611e5816ee351f7c8756034b8.exe

  • Size

    272KB

  • MD5

    8a0dd35e956381e5549ddfae9ab13960

  • SHA1

    1665be89594880d1bd88f952d1d2ea7a62107125

  • SHA256

    f0288bf4853d925b2d32556d1c443bf6f81516a611e5816ee351f7c8756034b8

  • SHA512

    5ec852575c78c05f05a5bbd0da0518411a636f5adf69532ec8c1a09fd8db647e96a3e537dc20917c880d10a64e93f036702975b359a32bb159b26294d11f33ff

  • SSDEEP

    3072:YMBGBT753Q+RgWgMlIx1ZiXjb6aEF6D0NM9voeLNZ2j8Ci2:dw753RgWg4aAXjb6aEFfooeLNZxC

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 28 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 9 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 9 IoCs
  • Disables RegEdit via registry modification 14 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 14 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 39 IoCs
  • Loads dropped DLL 35 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 56 IoCs
  • Enumerates connected drives 3 TTPs 44 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 42 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 16 IoCs
  • Drops file in Windows directory 9 IoCs
  • Program crash 12 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 40 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Modifies Internet Explorer start page 1 TTPs 14 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 40 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • System policy modification 1 TTPs 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0288bf4853d925b2d32556d1c443bf6f81516a611e5816ee351f7c8756034b8.exe
    "C:\Users\Admin\AppData\Local\Temp\f0288bf4853d925b2d32556d1c443bf6f81516a611e5816ee351f7c8756034b8.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2664
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:4284
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 700
        3⤵
        • Program crash
        PID:3548
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Disables RegEdit via registry modification
          • Disables cmd.exe use via registry modification
          • Executes dropped EXE
          • Modifies system executable filetype association
          • Adds Run key to start application
          • Modifies WinLogon
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies Internet Explorer start page
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:4872
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 724
            5⤵
            • Program crash
            PID:2624
            • C:\Windows\SysWOW64\Shell.exe
              "C:\Windows\system32\Shell.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3492
            • C:\Windows\SysWOW64\Shell.exe
              "C:\Windows\system32\Shell.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4896
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Disables RegEdit via registry modification
          • Disables cmd.exe use via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies system executable filetype association
          • Adds Run key to start application
          • Modifies WinLogon
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies Internet Explorer start page
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:1172
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 744
            5⤵
            • Program crash
            PID:2756
            • C:\Windows\SysWOW64\Shell.exe
              "C:\Windows\system32\Shell.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3468
            • C:\Windows\SysWOW64\Shell.exe
              "C:\Windows\system32\Shell.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:1808
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:4544
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 740
        3⤵
        • Program crash
        PID:3608
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Disables RegEdit via registry modification
          • Disables cmd.exe use via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies system executable filetype association
          • Adds Run key to start application
          • Modifies WinLogon
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies Internet Explorer start page
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:4856
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 728
            5⤵
            • Program crash
            PID:3236
            • C:\Windows\SysWOW64\Shell.exe
              "C:\Windows\system32\Shell.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:5064
            • C:\Windows\SysWOW64\Shell.exe
              "C:\Windows\system32\Shell.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3372
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Disables RegEdit via registry modification
          • Disables cmd.exe use via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies system executable filetype association
          • Adds Run key to start application
          • Enumerates connected drives
          • Modifies WinLogon
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies Internet Explorer start page
          • Modifies registry class
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3088
          • C:\Windows\Tiwi.exe
            C:\Windows\Tiwi.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • Disables RegEdit via registry modification
            • Disables cmd.exe use via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system executable filetype association
            • Adds Run key to start application
            • Modifies WinLogon
            • System Location Discovery: System Language Discovery
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies Internet Explorer start page
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:4596
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 716
              6⤵
              • Program crash
              PID:1396
              • C:\Windows\SysWOW64\Shell.exe
                "C:\Windows\system32\Shell.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1584
              • C:\Windows\SysWOW64\Shell.exe
                "C:\Windows\system32\Shell.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3020
          • C:\Windows\SysWOW64\IExplorer.exe
            C:\Windows\system32\IExplorer.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1580
          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4312
          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:3508
          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • Disables RegEdit via registry modification
            • Disables cmd.exe use via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Modifies WinLogon
            • System Location Discovery: System Language Discovery
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies Internet Explorer start page
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:4820
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 676
              6⤵
              • Program crash
              PID:4136
              • C:\Windows\SysWOW64\Shell.exe
                "C:\Windows\system32\Shell.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:972
              • C:\Windows\SysWOW64\Shell.exe
                "C:\Windows\system32\Shell.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1356
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:3956
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 716
        3⤵
        • Program crash
        PID:3788
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2896
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2296
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1948
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2460
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 684
        3⤵
        • Program crash
        PID:3748
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:972
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1440
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:4244
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 700
        3⤵
        • Program crash
        PID:4628
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4520
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3732
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 724 -s 700
        3⤵
        • Program crash
        PID:5080
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1612
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3768
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:4968
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 700
        3⤵
        • Program crash
        PID:1880
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2996
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3176
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:5004
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2072
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4284 -ip 4284
    1⤵
      PID:3376
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4872 -ip 4872
      1⤵
        PID:3368
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1172 -ip 1172
        1⤵
          PID:1812
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4544 -ip 4544
          1⤵
            PID:1684
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3956 -ip 3956
            1⤵
              PID:3632
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2460 -ip 2460
              1⤵
                PID:4380
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4856 -ip 4856
                1⤵
                  PID:4248
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 724 -ip 724
                  1⤵
                    PID:4056
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4968 -ip 4968
                    1⤵
                      PID:3496
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4244 -ip 4244
                      1⤵
                        PID:1808
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4596 -ip 4596
                        1⤵
                          PID:1568
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4820 -ip 4820
                          1⤵
                            PID:2900

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

                            Filesize

                            45KB

                            MD5

                            01654403b0b84ff6e0355b47f75ce1c4

                            SHA1

                            9a24f7d88df8ebe3fd9007c56d3f5a08837744b7

                            SHA256

                            3891949d116d1dc72d9e41a0e0d86af4fc7a7cfb0a2147b385749d4ca7608888

                            SHA512

                            7eb282dd0b14b521fce857ee4ea6db7341f5ce7bfc808bdece487e711be65f32bd0678234d777bebf9750339963ddeb4139abf2ed65f9d28f48b8ef6e5987dfd

                          • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

                            Filesize

                            272KB

                            MD5

                            bb69e572d6829becaca7cf0190000c86

                            SHA1

                            e76b32ab0399198d3e638219a402924114967c6e

                            SHA256

                            666df1f96fedecfd7fb9a1c22d5d7e60dc3c0025442c809c5f05de18ca3e3779

                            SHA512

                            409e884b1ff3be5384d8ad20316721903abf4a0c34218ddc5b203163d2876b49ecd84b193e77b897d38e0d307fd72128b4dbebec91c7207038dd93b74bc32231

                          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

                            Filesize

                            272KB

                            MD5

                            ed51f021d70f6c7402b7dd27ddb9bb80

                            SHA1

                            5ced48ea04acac148d2eb1d670aeec63936721a2

                            SHA256

                            ff92fbd3952216488eaa67a89d696037d557bdfb396343a46c478a4a287662dd

                            SHA512

                            a33c0d3bb12d292519b99573de805abd1a712bdd5ed43e86474af0daaba9b19d93193997b90f546d104cb3efddadf18a710bfa86a85571675bd1a4958330b506

                          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

                            Filesize

                            272KB

                            MD5

                            76f907eed2e8167ce6e4ed26d5da2f73

                            SHA1

                            d78993728729c8516a3bd67523acbf7394b98de7

                            SHA256

                            1fb63d113036f5796e050fd94683d59586a9e3940d703c4065204f56fb1f0c12

                            SHA512

                            a016dea15bd229e790bbee25ac99a623d8255e479d49b4c6f52b557940912fd7c71f1b80cf3daf60623578e504d55ce847c586e4ba323b49d28703ea2963770e

                          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

                            Filesize

                            45KB

                            MD5

                            0a04694b66b5527dc8d842eee2449b8d

                            SHA1

                            096d0af8ba8808958674d999a086eb8a1d0aca0e

                            SHA256

                            7815e0af2f815ee4a5b52cd154362e5383dec1915a9120b213747f6855398eca

                            SHA512

                            4edf3fe99a6e345af9a058ca2847afa5432e97cc10f82d502f33f819c3c3a8791ee65bfa654b5e9c8e615b94ba4d3f4d3a50c2d8ccdc6bdae397560d6c3cc4b2

                          • C:\Windows\SysWOW64\IExplorer.exe

                            Filesize

                            272KB

                            MD5

                            2bc1af7ed100b3b0a6cb3edf9b2697e1

                            SHA1

                            fe5b67bd816693d04cb8be541246a44a984004e2

                            SHA256

                            2d7c22bbec2281df559561be06979fed3357097ec3129d41c07f7921e3e99d9a

                            SHA512

                            24b004940c2fae7c11b8c8b9db968dcfd7219df2736b0a7a08d8a5cc3282589fbaebf1c45e26f67cb89f0f4d7db714f6a9bd1e752e3d706008ccaff01ad0f2aa

                          • C:\Windows\SysWOW64\shell.exe

                            Filesize

                            272KB

                            MD5

                            a3f7564d634343bf5948465d18fe9c7b

                            SHA1

                            d40d334d0df3498e2faebe27d4b046f8430b7f91

                            SHA256

                            b2809009b78d5fda824481b04fcd30d63255b8590ff1bfbb182862ace86d4612

                            SHA512

                            7831d6d8dfa9343c7073e791f44db5d44c5ec9f51ca5ed3668155dce5801e20e0fb62bab7582aea6c15aced7f54a09dfd786c3932f54e9029f9cda1cbe5ac70d

                          • C:\Windows\SysWOW64\shell.exe

                            Filesize

                            272KB

                            MD5

                            8a0dd35e956381e5549ddfae9ab13960

                            SHA1

                            1665be89594880d1bd88f952d1d2ea7a62107125

                            SHA256

                            f0288bf4853d925b2d32556d1c443bf6f81516a611e5816ee351f7c8756034b8

                            SHA512

                            5ec852575c78c05f05a5bbd0da0518411a636f5adf69532ec8c1a09fd8db647e96a3e537dc20917c880d10a64e93f036702975b359a32bb159b26294d11f33ff

                          • C:\Windows\SysWOW64\shell.exe

                            Filesize

                            272KB

                            MD5

                            695cab41eaedc10e7df2de4b431385a2

                            SHA1

                            81f121db0d9d12e3ba7415011228141e37d5cb7a

                            SHA256

                            de454673fce14de17275a28a207888705efc59bfab5031cb28127217a5fe50a6

                            SHA512

                            3355b35ea8727711fd039aeb8b575ec9fda7cce078db70a269fad483e0f582d4ac31f7e524b1d23968e4ef4b633683e077c1e7cd698d7c0421202a977ae6f41a

                          • C:\Windows\msvbvm60.dll

                            Filesize

                            1.4MB

                            MD5

                            25f62c02619174b35851b0e0455b3d94

                            SHA1

                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                            SHA256

                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                            SHA512

                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                          • C:\Windows\tiwi.exe

                            Filesize

                            272KB

                            MD5

                            bef057e3dae7a6c5b4a2bd1a63ca6409

                            SHA1

                            2ffe62ebe841c8c4a8c91c75ccd0cef35a919567

                            SHA256

                            b584dfea0b2b1b5cccf241ffaad08adf9aa420d10625e53e25c0bc5096b33920

                            SHA512

                            422846551fd2bd45f4b95d57544087a2bead38661426fbfea8d3b7e3ef5a941d9178410f283822672488d63a0affd5867ecd41ac15a2c9e53e7d2fac6b63f81b

                          • C:\Windows\tiwi.exe

                            Filesize

                            272KB

                            MD5

                            b916bfd8b5382319008d80568592f573

                            SHA1

                            fb9f8f109e168a2555e79c16d9bebe2bb763a9fd

                            SHA256

                            e2677308a660912e70c182877787157136967bc191517f1cad49df3feb61d8f1

                            SHA512

                            3f7170dc2963b99f44117748a48a9f901e08d929e8349cc609c932a04a96e1c0c237de399e180f6d63327f4119adc4b0f33e97d4f152d8e7f63827791ce38a79

                          • C:\Windows\tiwi.exe

                            Filesize

                            272KB

                            MD5

                            283d6f3a67d99324fdbb1f367d63b935

                            SHA1

                            7674641cbb6bbb06ca78c72f2ddaa0c1d5209052

                            SHA256

                            e27fa5560167ba2792a652feb1ddfbf7bcc363119ba23e43b998e983feab9bfd

                            SHA512

                            ff49c24cadad134365c488ab5c0036b02b2c5e53399f9e6112cdc53da0e0cebbc643dd6e1333293f3aa706fa94bb432267645da8574d95c1643b5294e3781997

                          • C:\present.txt

                            Filesize

                            729B

                            MD5

                            8e3c734e8dd87d639fb51500d42694b5

                            SHA1

                            f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

                            SHA256

                            574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

                            SHA512

                            06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

                          • F:\autorun.inf

                            Filesize

                            39B

                            MD5

                            415c421ba7ae46e77bdee3a681ecc156

                            SHA1

                            b0db5782b7688716d6fc83f7e650ffe1143201b7

                            SHA256

                            e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

                            SHA512

                            dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

                          • memory/724-267-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/724-249-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/972-224-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/972-372-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/1172-130-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/1356-375-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/1440-229-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/1580-336-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/1584-365-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/1612-261-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/1808-129-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/1948-206-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/1948-211-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/2072-361-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/2072-358-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/2296-203-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/2460-213-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/2460-237-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/2664-136-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/2664-362-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/2664-0-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/2896-198-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/2896-195-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/2996-302-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/3020-369-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/3088-340-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/3176-308-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/3372-244-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/3468-124-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/3492-110-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/3508-346-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/3508-349-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/3732-345-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/3768-266-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/3956-204-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/3956-184-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4244-243-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4244-331-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4284-95-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4284-131-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4312-344-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4520-337-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4544-232-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4544-137-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4596-326-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4596-366-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4820-351-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4820-376-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4856-190-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4856-248-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4872-115-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4872-101-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4896-114-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/4968-342-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/5004-356-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB

                          • memory/5064-235-0x0000000000400000-0x0000000000444000-memory.dmp

                            Filesize

                            272KB