Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 09:35
Behavioral task
behavioral1
Sample
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
Resource
win10v2004-20241007-en
General
-
Target
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
-
Size
8.2MB
-
MD5
1b6f9f0f8009139a81698cda6e140700
-
SHA1
dd575d166428d7fca33b522914846d09f167b5e9
-
SHA256
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8
-
SHA512
b930864fc236b0c4f997ac2ce908a5d70bfea833d1c639cb8a6212265e7199ba295400acc09fc5fe66706feded3b5ca46fdf80440e441ac7d6207b8379adbb62
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecS:V8e8e8f8e8e8X
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
Processes:
resource yara_rule C:\Windows\system\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat \Windows\system\spoolsv.exe warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Processes:
resource yara_rule C:\Windows\system\explorer.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 -
Executes dropped EXE 9 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 1524 explorer.exe 2972 explorer.exe 772 spoolsv.exe 1100 spoolsv.exe 2464 spoolsv.exe 2964 spoolsv.exe 2304 spoolsv.exe 2732 spoolsv.exe 880 spoolsv.exe -
Loads dropped DLL 58 IoCs
Processes:
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 2676 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 2676 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 1532 WerFault.exe 1532 WerFault.exe 1532 WerFault.exe 1532 WerFault.exe 1532 WerFault.exe 1532 WerFault.exe 1532 WerFault.exe 2972 explorer.exe 2972 explorer.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 2972 explorer.exe 2972 explorer.exe 824 WerFault.exe 824 WerFault.exe 824 WerFault.exe 824 WerFault.exe 824 WerFault.exe 824 WerFault.exe 824 WerFault.exe 2972 explorer.exe 2972 explorer.exe 544 WerFault.exe 544 WerFault.exe 544 WerFault.exe 544 WerFault.exe 544 WerFault.exe 544 WerFault.exe 544 WerFault.exe 2972 explorer.exe 2972 explorer.exe 1828 WerFault.exe 1828 WerFault.exe 1828 WerFault.exe 1828 WerFault.exe 1828 WerFault.exe 1828 WerFault.exe 1828 WerFault.exe 2972 explorer.exe 2972 explorer.exe 1148 WerFault.exe 1148 WerFault.exe 1148 WerFault.exe 1148 WerFault.exe 1148 WerFault.exe 1148 WerFault.exe 1148 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exeexplorer.exe1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exedescription pid process target process PID 2952 set thread context of 2676 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 2952 set thread context of 2656 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe diskperf.exe PID 1524 set thread context of 2972 1524 explorer.exe explorer.exe PID 1524 set thread context of 2836 1524 explorer.exe diskperf.exe -
Drops file in Windows directory 3 IoCs
Processes:
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1532 1100 WerFault.exe spoolsv.exe 1492 2464 WerFault.exe spoolsv.exe 824 2964 WerFault.exe spoolsv.exe 544 2304 WerFault.exe spoolsv.exe 1828 2732 WerFault.exe spoolsv.exe 1148 880 WerFault.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
spoolsv.exe1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exepid process 2676 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exepid process 2676 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 2676 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 2952 wrote to memory of 2676 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 2952 wrote to memory of 2676 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 2952 wrote to memory of 2676 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 2952 wrote to memory of 2676 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 2952 wrote to memory of 2676 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 2952 wrote to memory of 2676 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 2952 wrote to memory of 2676 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 2952 wrote to memory of 2676 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 2952 wrote to memory of 2676 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe PID 2952 wrote to memory of 2656 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe diskperf.exe PID 2952 wrote to memory of 2656 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe diskperf.exe PID 2952 wrote to memory of 2656 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe diskperf.exe PID 2952 wrote to memory of 2656 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe diskperf.exe PID 2952 wrote to memory of 2656 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe diskperf.exe PID 2952 wrote to memory of 2656 2952 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe diskperf.exe PID 2676 wrote to memory of 1524 2676 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe explorer.exe PID 2676 wrote to memory of 1524 2676 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe explorer.exe PID 2676 wrote to memory of 1524 2676 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe explorer.exe PID 2676 wrote to memory of 1524 2676 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe explorer.exe PID 1524 wrote to memory of 2972 1524 explorer.exe explorer.exe PID 1524 wrote to memory of 2972 1524 explorer.exe explorer.exe PID 1524 wrote to memory of 2972 1524 explorer.exe explorer.exe PID 1524 wrote to memory of 2972 1524 explorer.exe explorer.exe PID 1524 wrote to memory of 2972 1524 explorer.exe explorer.exe PID 1524 wrote to memory of 2972 1524 explorer.exe explorer.exe PID 1524 wrote to memory of 2972 1524 explorer.exe explorer.exe PID 1524 wrote to memory of 2972 1524 explorer.exe explorer.exe PID 1524 wrote to memory of 2972 1524 explorer.exe explorer.exe PID 1524 wrote to memory of 2836 1524 explorer.exe diskperf.exe PID 1524 wrote to memory of 2836 1524 explorer.exe diskperf.exe PID 1524 wrote to memory of 2836 1524 explorer.exe diskperf.exe PID 1524 wrote to memory of 2836 1524 explorer.exe diskperf.exe PID 1524 wrote to memory of 2836 1524 explorer.exe diskperf.exe PID 1524 wrote to memory of 2836 1524 explorer.exe diskperf.exe PID 2972 wrote to memory of 772 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 772 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 772 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 772 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 1100 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 1100 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 1100 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 1100 2972 explorer.exe spoolsv.exe PID 1100 wrote to memory of 1532 1100 spoolsv.exe WerFault.exe PID 1100 wrote to memory of 1532 1100 spoolsv.exe WerFault.exe PID 1100 wrote to memory of 1532 1100 spoolsv.exe WerFault.exe PID 1100 wrote to memory of 1532 1100 spoolsv.exe WerFault.exe PID 2972 wrote to memory of 2464 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 2464 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 2464 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 2464 2972 explorer.exe spoolsv.exe PID 2464 wrote to memory of 1492 2464 spoolsv.exe WerFault.exe PID 2464 wrote to memory of 1492 2464 spoolsv.exe WerFault.exe PID 2464 wrote to memory of 1492 2464 spoolsv.exe WerFault.exe PID 2464 wrote to memory of 1492 2464 spoolsv.exe WerFault.exe PID 2972 wrote to memory of 2964 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 2964 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 2964 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 2964 2972 explorer.exe spoolsv.exe PID 2964 wrote to memory of 824 2964 spoolsv.exe WerFault.exe PID 2964 wrote to memory of 824 2964 spoolsv.exe WerFault.exe PID 2964 wrote to memory of 824 2964 spoolsv.exe WerFault.exe PID 2964 wrote to memory of 824 2964 spoolsv.exe WerFault.exe PID 2972 wrote to memory of 2304 2972 explorer.exe spoolsv.exe PID 2972 wrote to memory of 2304 2972 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:772
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1532
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1492
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 366⤵
- Loads dropped DLL
- Program crash
PID:824
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 366⤵
- Loads dropped DLL
- Program crash
PID:544
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1828
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1148
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:2836
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD51b6f9f0f8009139a81698cda6e140700
SHA1dd575d166428d7fca33b522914846d09f167b5e9
SHA2561e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8
SHA512b930864fc236b0c4f997ac2ce908a5d70bfea833d1c639cb8a6212265e7199ba295400acc09fc5fe66706feded3b5ca46fdf80440e441ac7d6207b8379adbb62
-
Filesize
8.2MB
MD573f2b8654797e1fcb509f1a1100f0d62
SHA15f14ccf42245adc1a41ed503e08fcba71b9e2385
SHA2563a0ff12213a27d2b21ac59044fd74daf3c618691f077c19e92009c59736ee326
SHA5129c079c228a4f6a4e9c6b7b9737767ac5072a079e57bbec35681e345553196d4f41f375c51c878c1784c841e5335f8a1b3746844d2eac533290014ea12658d22b
-
Filesize
8.2MB
MD5b9c188ea7b91f18a1249231827e4a66a
SHA14580c04c1c5854b4a43569675b22db661bdf1aff
SHA256922a2c5c39d7f6d1f5969dd1f72ddff2fa268dd5c65774aa7f009a4a391fce10
SHA5128a71edc15ad32d374f89883a72aed4499f5b6a34869e1bd9b7e7d0e8f59583e701e0b16c7aa9cc34bdc57b98f230d2255cbdc18866f1716a60fbbb7c224ae5b8