Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 09:46
Behavioral task
behavioral1
Sample
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
Resource
win10v2004-20241007-en
General
-
Target
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
-
Size
8.2MB
-
MD5
1b6f9f0f8009139a81698cda6e140700
-
SHA1
dd575d166428d7fca33b522914846d09f167b5e9
-
SHA256
1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8
-
SHA512
b930864fc236b0c4f997ac2ce908a5d70bfea833d1c639cb8a6212265e7199ba295400acc09fc5fe66706feded3b5ca46fdf80440e441ac7d6207b8379adbb62
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecS:V8e8e8f8e8e8X
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0009000000016c89-42.dat warzonerat behavioral1/files/0x0008000000016890-80.dat warzonerat behavioral1/files/0x000a000000016890-94.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0009000000016c89-42.dat aspack_v212_v242 behavioral1/files/0x0008000000016890-80.dat aspack_v212_v242 behavioral1/files/0x000a000000016890-94.dat aspack_v212_v242 -
Executes dropped EXE 13 IoCs
pid Process 2656 explorer.exe 1052 explorer.exe 1796 spoolsv.exe 2024 spoolsv.exe 2536 spoolsv.exe 1672 spoolsv.exe 1152 spoolsv.exe 2196 spoolsv.exe 892 spoolsv.exe 1652 spoolsv.exe 2288 spoolsv.exe 2308 spoolsv.exe 2716 svchost.exe -
Loads dropped DLL 64 IoCs
pid Process 2412 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 2412 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 1052 explorer.exe 1052 explorer.exe 1008 WerFault.exe 1008 WerFault.exe 1008 WerFault.exe 1008 WerFault.exe 1008 WerFault.exe 1008 WerFault.exe 1008 WerFault.exe 1052 explorer.exe 1052 explorer.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe 1052 explorer.exe 1052 explorer.exe 1692 WerFault.exe 1692 WerFault.exe 1692 WerFault.exe 1692 WerFault.exe 1692 WerFault.exe 1692 WerFault.exe 1692 WerFault.exe 1052 explorer.exe 1052 explorer.exe 560 WerFault.exe 560 WerFault.exe 560 WerFault.exe 560 WerFault.exe 560 WerFault.exe 560 WerFault.exe 560 WerFault.exe 1052 explorer.exe 1052 explorer.exe 1804 WerFault.exe 1804 WerFault.exe 1804 WerFault.exe 1804 WerFault.exe 1804 WerFault.exe 1804 WerFault.exe 1804 WerFault.exe 1052 explorer.exe 1052 explorer.exe 1968 WerFault.exe 1968 WerFault.exe 1968 WerFault.exe 1968 WerFault.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1636 set thread context of 2412 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 30 PID 1636 set thread context of 2636 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 31 PID 2656 set thread context of 1052 2656 explorer.exe 33 PID 2656 set thread context of 1076 2656 explorer.exe 34 PID 1796 set thread context of 2308 1796 spoolsv.exe 52 PID 1796 set thread context of 3052 1796 spoolsv.exe 53 -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 2772 2024 WerFault.exe 36 1008 2536 WerFault.exe 38 1360 1672 WerFault.exe 40 1692 1152 WerFault.exe 42 560 2196 WerFault.exe 44 1804 892 WerFault.exe 46 1968 1652 WerFault.exe 48 3020 2288 WerFault.exe 50 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2412 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1052 explorer.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2412 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 2412 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 1052 explorer.exe 2308 spoolsv.exe 2308 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2412 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 30 PID 1636 wrote to memory of 2412 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 30 PID 1636 wrote to memory of 2412 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 30 PID 1636 wrote to memory of 2412 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 30 PID 1636 wrote to memory of 2412 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 30 PID 1636 wrote to memory of 2412 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 30 PID 1636 wrote to memory of 2412 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 30 PID 1636 wrote to memory of 2412 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 30 PID 1636 wrote to memory of 2412 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 30 PID 1636 wrote to memory of 2636 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 31 PID 1636 wrote to memory of 2636 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 31 PID 1636 wrote to memory of 2636 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 31 PID 1636 wrote to memory of 2636 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 31 PID 1636 wrote to memory of 2636 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 31 PID 1636 wrote to memory of 2636 1636 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 31 PID 2412 wrote to memory of 2656 2412 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 32 PID 2412 wrote to memory of 2656 2412 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 32 PID 2412 wrote to memory of 2656 2412 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 32 PID 2412 wrote to memory of 2656 2412 1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe 32 PID 2656 wrote to memory of 1052 2656 explorer.exe 33 PID 2656 wrote to memory of 1052 2656 explorer.exe 33 PID 2656 wrote to memory of 1052 2656 explorer.exe 33 PID 2656 wrote to memory of 1052 2656 explorer.exe 33 PID 2656 wrote to memory of 1052 2656 explorer.exe 33 PID 2656 wrote to memory of 1052 2656 explorer.exe 33 PID 2656 wrote to memory of 1052 2656 explorer.exe 33 PID 2656 wrote to memory of 1052 2656 explorer.exe 33 PID 2656 wrote to memory of 1052 2656 explorer.exe 33 PID 2656 wrote to memory of 1076 2656 explorer.exe 34 PID 2656 wrote to memory of 1076 2656 explorer.exe 34 PID 2656 wrote to memory of 1076 2656 explorer.exe 34 PID 2656 wrote to memory of 1076 2656 explorer.exe 34 PID 2656 wrote to memory of 1076 2656 explorer.exe 34 PID 2656 wrote to memory of 1076 2656 explorer.exe 34 PID 1052 wrote to memory of 1796 1052 explorer.exe 35 PID 1052 wrote to memory of 1796 1052 explorer.exe 35 PID 1052 wrote to memory of 1796 1052 explorer.exe 35 PID 1052 wrote to memory of 1796 1052 explorer.exe 35 PID 1052 wrote to memory of 2024 1052 explorer.exe 36 PID 1052 wrote to memory of 2024 1052 explorer.exe 36 PID 1052 wrote to memory of 2024 1052 explorer.exe 36 PID 1052 wrote to memory of 2024 1052 explorer.exe 36 PID 2024 wrote to memory of 2772 2024 spoolsv.exe 37 PID 2024 wrote to memory of 2772 2024 spoolsv.exe 37 PID 2024 wrote to memory of 2772 2024 spoolsv.exe 37 PID 2024 wrote to memory of 2772 2024 spoolsv.exe 37 PID 1052 wrote to memory of 2536 1052 explorer.exe 38 PID 1052 wrote to memory of 2536 1052 explorer.exe 38 PID 1052 wrote to memory of 2536 1052 explorer.exe 38 PID 1052 wrote to memory of 2536 1052 explorer.exe 38 PID 2536 wrote to memory of 1008 2536 spoolsv.exe 39 PID 2536 wrote to memory of 1008 2536 spoolsv.exe 39 PID 2536 wrote to memory of 1008 2536 spoolsv.exe 39 PID 2536 wrote to memory of 1008 2536 spoolsv.exe 39 PID 1052 wrote to memory of 1672 1052 explorer.exe 40 PID 1052 wrote to memory of 1672 1052 explorer.exe 40 PID 1052 wrote to memory of 1672 1052 explorer.exe 40 PID 1052 wrote to memory of 1672 1052 explorer.exe 40 PID 1672 wrote to memory of 1360 1672 spoolsv.exe 41 PID 1672 wrote to memory of 1360 1672 spoolsv.exe 41 PID 1672 wrote to memory of 1360 1672 spoolsv.exe 41 PID 1672 wrote to memory of 1360 1672 spoolsv.exe 41 PID 1052 wrote to memory of 1152 1052 explorer.exe 42 PID 1052 wrote to memory of 1152 1052 explorer.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1796 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2308 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2716
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:3052
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2772
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1008
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1360
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1692
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 366⤵
- Loads dropped DLL
- Program crash
PID:560
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1804
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1968
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 366⤵
- Program crash
PID:3020
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:1076
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD51b6f9f0f8009139a81698cda6e140700
SHA1dd575d166428d7fca33b522914846d09f167b5e9
SHA2561e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8
SHA512b930864fc236b0c4f997ac2ce908a5d70bfea833d1c639cb8a6212265e7199ba295400acc09fc5fe66706feded3b5ca46fdf80440e441ac7d6207b8379adbb62
-
Filesize
8.2MB
MD536ca5fac629a77a35b6fb4b7aac5c78f
SHA1dd9e36f7c25c2e7e891f0942fefcd46540718595
SHA256d27e7b313251a38dc9534436ab02e3baae937d762a11fea0739d4567f871e675
SHA512bf84891ce18e80b24f3544fd042a34cbb9127d972e94cf3fa579ba28ee0874d6bb316aa67f1d4510770bb8b0c8c97c9f739f3d156d74c24ccc9c087316fbaf04
-
Filesize
8.2MB
MD55c6a9d1effe024fe2795c2b62b489354
SHA122bec2c425259de6bd925874e965e325dcc430c4
SHA256066f33c319fdb847687f5b37c340d3af1ce51d7044a5a740b5e1c2d523a3e219
SHA512725f88dffa88bc8f31113e45f0f5940da1a8bd899428d2c850fa02e09f2ac2eee2260714962a7cce55fa3bdbda80fec0799c47969ff65d2c94283eff13439075