Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-10-2024 19:58
Behavioral task
behavioral1
Sample
0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe
Resource
win10v2004-20241007-en
General
-
Target
0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe
-
Size
8.2MB
-
MD5
97b7a0352464b16ebf2241e7eb8c08a4
-
SHA1
c9b22e8d3f02f481600fa3ec6a652bbfde5eb2c5
-
SHA256
0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be
-
SHA512
76548bb04e9439bdf4d76c9ccc3880c1ef888de50dcacf2b70d5855045d70f22a7a095f8dde541cac67977ddde2de12bd0d8ebafc69385ffe18886f6d976603b
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecR:V8e8e8f8e8e8Q
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0009000000016de4-42.dat warzonerat behavioral1/files/0x0009000000016db5-80.dat warzonerat behavioral1/files/0x0008000000016eb8-96.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0009000000016de4-42.dat aspack_v212_v242 behavioral1/files/0x0009000000016db5-80.dat aspack_v212_v242 behavioral1/files/0x0008000000016eb8-96.dat aspack_v212_v242 -
Executes dropped EXE 13 IoCs
pid Process 2684 explorer.exe 2736 explorer.exe 2688 spoolsv.exe 2124 spoolsv.exe 956 spoolsv.exe 936 spoolsv.exe 2440 spoolsv.exe 1680 spoolsv.exe 2252 spoolsv.exe 1948 spoolsv.exe 2664 spoolsv.exe 2668 spoolsv.exe 2560 svchost.exe -
Loads dropped DLL 64 IoCs
pid Process 2744 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 2744 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 1864 WerFault.exe 1864 WerFault.exe 1864 WerFault.exe 1864 WerFault.exe 1864 WerFault.exe 1864 WerFault.exe 1864 WerFault.exe 2736 explorer.exe 2736 explorer.exe 1620 WerFault.exe 1620 WerFault.exe 1620 WerFault.exe 1620 WerFault.exe 1620 WerFault.exe 1620 WerFault.exe 1620 WerFault.exe 2736 explorer.exe 2736 explorer.exe 2200 WerFault.exe 2200 WerFault.exe 2200 WerFault.exe 2200 WerFault.exe 2200 WerFault.exe 2200 WerFault.exe 2200 WerFault.exe 2736 explorer.exe 2736 explorer.exe 1032 WerFault.exe 1032 WerFault.exe 1032 WerFault.exe 1032 WerFault.exe 1032 WerFault.exe 1032 WerFault.exe 1032 WerFault.exe 2736 explorer.exe 2736 explorer.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 2736 explorer.exe 2736 explorer.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 2736 explorer.exe 2736 explorer.exe 3024 WerFault.exe 3024 WerFault.exe 3024 WerFault.exe 3024 WerFault.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3012 set thread context of 2744 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 31 PID 3012 set thread context of 2784 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 32 PID 2684 set thread context of 2736 2684 explorer.exe 35 PID 2684 set thread context of 1584 2684 explorer.exe 36 PID 2688 set thread context of 2668 2688 spoolsv.exe 54 PID 2688 set thread context of 2644 2688 spoolsv.exe 55 -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 1864 2124 WerFault.exe 38 1620 956 WerFault.exe 40 2200 936 WerFault.exe 42 1032 2440 WerFault.exe 44 1780 1680 WerFault.exe 46 3000 2252 WerFault.exe 48 3024 1948 WerFault.exe 50 3020 2664 WerFault.exe 52 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2744 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2736 explorer.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2744 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 2744 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2736 explorer.exe 2668 spoolsv.exe 2668 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2744 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 31 PID 3012 wrote to memory of 2744 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 31 PID 3012 wrote to memory of 2744 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 31 PID 3012 wrote to memory of 2744 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 31 PID 3012 wrote to memory of 2744 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 31 PID 3012 wrote to memory of 2744 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 31 PID 3012 wrote to memory of 2744 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 31 PID 3012 wrote to memory of 2744 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 31 PID 3012 wrote to memory of 2744 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 31 PID 3012 wrote to memory of 2784 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 32 PID 3012 wrote to memory of 2784 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 32 PID 3012 wrote to memory of 2784 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 32 PID 3012 wrote to memory of 2784 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 32 PID 3012 wrote to memory of 2784 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 32 PID 3012 wrote to memory of 2784 3012 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 32 PID 2744 wrote to memory of 2684 2744 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 33 PID 2744 wrote to memory of 2684 2744 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 33 PID 2744 wrote to memory of 2684 2744 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 33 PID 2744 wrote to memory of 2684 2744 0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe 33 PID 2684 wrote to memory of 2736 2684 explorer.exe 35 PID 2684 wrote to memory of 2736 2684 explorer.exe 35 PID 2684 wrote to memory of 2736 2684 explorer.exe 35 PID 2684 wrote to memory of 2736 2684 explorer.exe 35 PID 2684 wrote to memory of 2736 2684 explorer.exe 35 PID 2684 wrote to memory of 2736 2684 explorer.exe 35 PID 2684 wrote to memory of 2736 2684 explorer.exe 35 PID 2684 wrote to memory of 2736 2684 explorer.exe 35 PID 2684 wrote to memory of 2736 2684 explorer.exe 35 PID 2684 wrote to memory of 1584 2684 explorer.exe 36 PID 2684 wrote to memory of 1584 2684 explorer.exe 36 PID 2684 wrote to memory of 1584 2684 explorer.exe 36 PID 2684 wrote to memory of 1584 2684 explorer.exe 36 PID 2684 wrote to memory of 1584 2684 explorer.exe 36 PID 2684 wrote to memory of 1584 2684 explorer.exe 36 PID 2736 wrote to memory of 2688 2736 explorer.exe 37 PID 2736 wrote to memory of 2688 2736 explorer.exe 37 PID 2736 wrote to memory of 2688 2736 explorer.exe 37 PID 2736 wrote to memory of 2688 2736 explorer.exe 37 PID 2736 wrote to memory of 2124 2736 explorer.exe 38 PID 2736 wrote to memory of 2124 2736 explorer.exe 38 PID 2736 wrote to memory of 2124 2736 explorer.exe 38 PID 2736 wrote to memory of 2124 2736 explorer.exe 38 PID 2124 wrote to memory of 1864 2124 spoolsv.exe 39 PID 2124 wrote to memory of 1864 2124 spoolsv.exe 39 PID 2124 wrote to memory of 1864 2124 spoolsv.exe 39 PID 2124 wrote to memory of 1864 2124 spoolsv.exe 39 PID 2736 wrote to memory of 956 2736 explorer.exe 40 PID 2736 wrote to memory of 956 2736 explorer.exe 40 PID 2736 wrote to memory of 956 2736 explorer.exe 40 PID 2736 wrote to memory of 956 2736 explorer.exe 40 PID 956 wrote to memory of 1620 956 spoolsv.exe 41 PID 956 wrote to memory of 1620 956 spoolsv.exe 41 PID 956 wrote to memory of 1620 956 spoolsv.exe 41 PID 956 wrote to memory of 1620 956 spoolsv.exe 41 PID 2736 wrote to memory of 936 2736 explorer.exe 42 PID 2736 wrote to memory of 936 2736 explorer.exe 42 PID 2736 wrote to memory of 936 2736 explorer.exe 42 PID 2736 wrote to memory of 936 2736 explorer.exe 42 PID 936 wrote to memory of 2200 936 spoolsv.exe 43 PID 936 wrote to memory of 2200 936 spoolsv.exe 43 PID 936 wrote to memory of 2200 936 spoolsv.exe 43 PID 936 wrote to memory of 2200 936 spoolsv.exe 43 PID 2736 wrote to memory of 2440 2736 explorer.exe 44 PID 2736 wrote to memory of 2440 2736 explorer.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe"C:\Users\Admin\AppData\Local\Temp\0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe"C:\Users\Admin\AppData\Local\Temp\0f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2688 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2668 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:2644
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1864
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1620
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2200
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1032
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1780
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 366⤵
- Loads dropped DLL
- Program crash
PID:3000
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 366⤵
- Loads dropped DLL
- Program crash
PID:3024
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 366⤵
- Program crash
PID:3020
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:1584
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD597b7a0352464b16ebf2241e7eb8c08a4
SHA1c9b22e8d3f02f481600fa3ec6a652bbfde5eb2c5
SHA2560f52530f6dbe366263586096b2cfd34f31942f50a220e2d8e9636c54f5d6e7be
SHA51276548bb04e9439bdf4d76c9ccc3880c1ef888de50dcacf2b70d5855045d70f22a7a095f8dde541cac67977ddde2de12bd0d8ebafc69385ffe18886f6d976603b
-
Filesize
8.2MB
MD5b339b78135283488e35dacc9458e17ec
SHA11d853c0c33f15e1c200dc7591a787ac6338151b2
SHA256cc5589dc83023caf9c126402251f3126d010815b4f6f00ce3c4da43ebce947e5
SHA5129e84ae59a7946607f8860c9b37699d88b4bd91bd1f94368e99717387f76be531d5cf6f86e8af960057ff463676428688b7b063650cb140f771f29cc3324af37b
-
Filesize
8.2MB
MD5d354107aa3560abaa43fa23dc90203a6
SHA1f102132e8c6173841d8c36eb72114e50cd351758
SHA25688284aeb96664ca8eb372f83be209a1c69b8cce16b459d3f4135512e56729a62
SHA512d25006a91d2a064b67a267b5f835e9aea529ee9a6c74746dfdbc8ada91f187c2690f48b8b132acd6306665f2bf0e5e39e1343e8b6422857faa2fe3ac0f299e62