Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 20:52
Behavioral task
behavioral1
Sample
29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe
Resource
win10v2004-20241007-en
General
-
Target
29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe
-
Size
3.9MB
-
MD5
ab666776df79673960bb46d5e707271d
-
SHA1
1ea9473835bdc9870cfbf6f10c6a73dc4bfa2586
-
SHA256
29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca
-
SHA512
978ccbf92c4eed0161b4285062eb79e1fdf77464a398cc1ee4c57d6aab83df37b15195c3dc15b86d90fd3fe1ebd4c39ff1e348258ef9ebc3e29ee992bbbdfa0b
-
SSDEEP
24576:GIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQD6:7C0bNechC0bNechC0bNecS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000015d48-42.dat warzonerat behavioral1/files/0x0008000000015d19-80.dat warzonerat behavioral1/files/0x0008000000015d70-96.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
resource yara_rule behavioral1/files/0x0008000000015d48-42.dat aspack_v212_v242 behavioral1/files/0x0008000000015d19-80.dat aspack_v212_v242 behavioral1/files/0x0008000000015d70-96.dat aspack_v212_v242 -
Executes dropped EXE 13 IoCs
pid Process 2912 explorer.exe 2044 explorer.exe 1976 spoolsv.exe 2272 spoolsv.exe 952 spoolsv.exe 832 spoolsv.exe 896 spoolsv.exe 2328 spoolsv.exe 1520 spoolsv.exe 2056 spoolsv.exe 1004 spoolsv.exe 2824 spoolsv.exe 2548 svchost.exe -
Loads dropped DLL 64 IoCs
pid Process 2152 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 2152 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2116 WerFault.exe 2116 WerFault.exe 2116 WerFault.exe 2116 WerFault.exe 2116 WerFault.exe 2116 WerFault.exe 2116 WerFault.exe 2044 explorer.exe 2044 explorer.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe 2044 explorer.exe 2044 explorer.exe 1632 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 2044 explorer.exe 2044 explorer.exe 2452 WerFault.exe 2452 WerFault.exe 2452 WerFault.exe 2452 WerFault.exe 2452 WerFault.exe 2452 WerFault.exe 2452 WerFault.exe 2044 explorer.exe 2044 explorer.exe 1992 WerFault.exe 1992 WerFault.exe 1992 WerFault.exe 1992 WerFault.exe 1992 WerFault.exe 1992 WerFault.exe 1992 WerFault.exe 2044 explorer.exe 2044 explorer.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2044 explorer.exe 2044 explorer.exe 2400 WerFault.exe 2400 WerFault.exe 2400 WerFault.exe 2400 WerFault.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1856 set thread context of 2152 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 31 PID 1856 set thread context of 2712 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 32 PID 2912 set thread context of 2044 2912 explorer.exe 34 PID 2912 set thread context of 316 2912 explorer.exe 35 PID 1976 set thread context of 2824 1976 spoolsv.exe 53 PID 1976 set thread context of 2756 1976 spoolsv.exe 54 -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 2116 2272 WerFault.exe 1744 952 WerFault.exe 39 1632 832 WerFault.exe 41 2452 896 WerFault.exe 1992 2328 WerFault.exe 45 2580 1520 WerFault.exe 47 2400 2056 WerFault.exe 49 2168 1004 WerFault.exe 51 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2152 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2044 explorer.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2152 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 2152 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2044 explorer.exe 2824 spoolsv.exe 2824 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2152 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 31 PID 1856 wrote to memory of 2152 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 31 PID 1856 wrote to memory of 2152 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 31 PID 1856 wrote to memory of 2152 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 31 PID 1856 wrote to memory of 2152 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 31 PID 1856 wrote to memory of 2152 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 31 PID 1856 wrote to memory of 2152 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 31 PID 1856 wrote to memory of 2152 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 31 PID 1856 wrote to memory of 2152 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 31 PID 1856 wrote to memory of 2712 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 32 PID 1856 wrote to memory of 2712 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 32 PID 1856 wrote to memory of 2712 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 32 PID 1856 wrote to memory of 2712 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 32 PID 1856 wrote to memory of 2712 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 32 PID 1856 wrote to memory of 2712 1856 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 32 PID 2152 wrote to memory of 2912 2152 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 33 PID 2152 wrote to memory of 2912 2152 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 33 PID 2152 wrote to memory of 2912 2152 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 33 PID 2152 wrote to memory of 2912 2152 29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe 33 PID 2912 wrote to memory of 2044 2912 explorer.exe 34 PID 2912 wrote to memory of 2044 2912 explorer.exe 34 PID 2912 wrote to memory of 2044 2912 explorer.exe 34 PID 2912 wrote to memory of 2044 2912 explorer.exe 34 PID 2912 wrote to memory of 2044 2912 explorer.exe 34 PID 2912 wrote to memory of 2044 2912 explorer.exe 34 PID 2912 wrote to memory of 2044 2912 explorer.exe 34 PID 2912 wrote to memory of 2044 2912 explorer.exe 34 PID 2912 wrote to memory of 2044 2912 explorer.exe 34 PID 2912 wrote to memory of 316 2912 explorer.exe 35 PID 2912 wrote to memory of 316 2912 explorer.exe 35 PID 2912 wrote to memory of 316 2912 explorer.exe 35 PID 2912 wrote to memory of 316 2912 explorer.exe 35 PID 2912 wrote to memory of 316 2912 explorer.exe 35 PID 2912 wrote to memory of 316 2912 explorer.exe 35 PID 2044 wrote to memory of 1976 2044 explorer.exe 36 PID 2044 wrote to memory of 1976 2044 explorer.exe 36 PID 2044 wrote to memory of 1976 2044 explorer.exe 36 PID 2044 wrote to memory of 1976 2044 explorer.exe 36 PID 2044 wrote to memory of 2272 2044 explorer.exe 37 PID 2044 wrote to memory of 2272 2044 explorer.exe 37 PID 2044 wrote to memory of 2272 2044 explorer.exe 37 PID 2044 wrote to memory of 2272 2044 explorer.exe 37 PID 2272 wrote to memory of 2116 2272 spoolsv.exe 38 PID 2272 wrote to memory of 2116 2272 spoolsv.exe 38 PID 2272 wrote to memory of 2116 2272 spoolsv.exe 38 PID 2272 wrote to memory of 2116 2272 spoolsv.exe 38 PID 2044 wrote to memory of 952 2044 explorer.exe 39 PID 2044 wrote to memory of 952 2044 explorer.exe 39 PID 2044 wrote to memory of 952 2044 explorer.exe 39 PID 2044 wrote to memory of 952 2044 explorer.exe 39 PID 952 wrote to memory of 1744 952 spoolsv.exe 40 PID 952 wrote to memory of 1744 952 spoolsv.exe 40 PID 952 wrote to memory of 1744 952 spoolsv.exe 40 PID 952 wrote to memory of 1744 952 spoolsv.exe 40 PID 2044 wrote to memory of 832 2044 explorer.exe 41 PID 2044 wrote to memory of 832 2044 explorer.exe 41 PID 2044 wrote to memory of 832 2044 explorer.exe 41 PID 2044 wrote to memory of 832 2044 explorer.exe 41 PID 832 wrote to memory of 1632 832 spoolsv.exe 42 PID 832 wrote to memory of 1632 832 spoolsv.exe 42 PID 832 wrote to memory of 1632 832 spoolsv.exe 42 PID 832 wrote to memory of 1632 832 spoolsv.exe 42 PID 2044 wrote to memory of 896 2044 explorer.exe 43 PID 2044 wrote to memory of 896 2044 explorer.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe"C:\Users\Admin\AppData\Local\Temp\29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe"C:\Users\Admin\AppData\Local\Temp\29dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1976 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2824 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2548
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:2756
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2116
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1744
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1632
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 896 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2452
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1992
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2580
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2400
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1004 -s 366⤵
- Program crash
PID:2168
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:316
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD5ab666776df79673960bb46d5e707271d
SHA11ea9473835bdc9870cfbf6f10c6a73dc4bfa2586
SHA25629dbdca14a2afdfc1bb152ba8fa2406adc433d76cbce1e31d0f91529094551ca
SHA512978ccbf92c4eed0161b4285062eb79e1fdf77464a398cc1ee4c57d6aab83df37b15195c3dc15b86d90fd3fe1ebd4c39ff1e348258ef9ebc3e29ee992bbbdfa0b
-
Filesize
3.9MB
MD54592fe49c679cecc21714de3200259d6
SHA1d2526026fb4c4097eeaef3dab7963e8fcb103982
SHA256cf0ba51a1cf66bacd056409f1619dff00fe9705c48cc930f1ce66d0439e182e5
SHA512b8586539b4a72230cec45427aca17d31aa50b88fe37c66a64736c2d236dcd6e46d14ca559bddd660a34ab5ef5a65cc7f15f92a4aa60ff9ea73e43f7b997f6f94
-
Filesize
3.9MB
MD59afcf2abbfa753a74e914f05e38b10b5
SHA1d2a635c0c302b7b72688b0f8cb17b7640c0b942c
SHA256b4aeea059554096677e15932a93b9781005edc047f83a9bc0f76f11b834e8847
SHA51200ae94956165f5993e0b7d9ed46de0ceda08ec1e0eacfe7bc2a1d146d3f6dde82bd86d6047e60419fe539e90ed3e03d858dc6be46a76a90d6b9cc8d5b13c505c