Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 04:36
Behavioral task
behavioral1
Sample
0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe
Resource
win10v2004-20241007-en
General
-
Target
0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe
-
Size
8.2MB
-
MD5
cadf9a61b1390a36a29c01e118be8a20
-
SHA1
78ef4702848ffdd3819a2d323090d6a71f95f8a8
-
SHA256
0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbc
-
SHA512
37bfce0b2626632018120116ec72685602d280826e4b6bc6ea187c8eda8d7f80f18f04f4ae0b7f72e04c44f122db0f51f2a090fcac750dce3d8709b00695d7de
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNec5:V8e8e8f8e8e8u
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
Processes:
resource yara_rule C:\Windows\system\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat \Windows\system\spoolsv.exe warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Processes:
resource yara_rule C:\Windows\system\explorer.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 -
Executes dropped EXE 9 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2464 explorer.exe 1276 explorer.exe 2228 spoolsv.exe 2268 spoolsv.exe 1340 spoolsv.exe 3016 spoolsv.exe 1724 spoolsv.exe 1756 spoolsv.exe 2148 spoolsv.exe -
Loads dropped DLL 58 IoCs
Processes:
0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exeexplorer.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 2748 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 2748 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1748 WerFault.exe 1748 WerFault.exe 1748 WerFault.exe 1748 WerFault.exe 1748 WerFault.exe 1748 WerFault.exe 1748 WerFault.exe 1276 explorer.exe 1276 explorer.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 1276 explorer.exe 1276 explorer.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1276 explorer.exe 1276 explorer.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 1276 explorer.exe 1276 explorer.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 1276 explorer.exe 1276 explorer.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exeexplorer.exe0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exeexplorer.exedescription pid process target process PID 2072 set thread context of 2748 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe PID 2072 set thread context of 2888 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe diskperf.exe PID 2464 set thread context of 1276 2464 explorer.exe explorer.exe PID 2464 set thread context of 1764 2464 explorer.exe diskperf.exe -
Drops file in Windows directory 3 IoCs
Processes:
0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exeexplorer.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1748 2268 WerFault.exe spoolsv.exe 2192 1340 WerFault.exe spoolsv.exe 1492 3016 WerFault.exe spoolsv.exe 2184 1724 WerFault.exe spoolsv.exe 3000 1756 WerFault.exe spoolsv.exe 2348 2148 WerFault.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
spoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exeexplorer.exespoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exeexplorer.exepid process 2748 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exeexplorer.exepid process 2748 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 2748 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 2072 wrote to memory of 2748 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe PID 2072 wrote to memory of 2748 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe PID 2072 wrote to memory of 2748 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe PID 2072 wrote to memory of 2748 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe PID 2072 wrote to memory of 2748 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe PID 2072 wrote to memory of 2748 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe PID 2072 wrote to memory of 2748 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe PID 2072 wrote to memory of 2748 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe PID 2072 wrote to memory of 2748 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe PID 2072 wrote to memory of 2888 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe diskperf.exe PID 2072 wrote to memory of 2888 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe diskperf.exe PID 2072 wrote to memory of 2888 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe diskperf.exe PID 2072 wrote to memory of 2888 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe diskperf.exe PID 2072 wrote to memory of 2888 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe diskperf.exe PID 2072 wrote to memory of 2888 2072 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe diskperf.exe PID 2748 wrote to memory of 2464 2748 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe explorer.exe PID 2748 wrote to memory of 2464 2748 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe explorer.exe PID 2748 wrote to memory of 2464 2748 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe explorer.exe PID 2748 wrote to memory of 2464 2748 0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe explorer.exe PID 2464 wrote to memory of 1276 2464 explorer.exe explorer.exe PID 2464 wrote to memory of 1276 2464 explorer.exe explorer.exe PID 2464 wrote to memory of 1276 2464 explorer.exe explorer.exe PID 2464 wrote to memory of 1276 2464 explorer.exe explorer.exe PID 2464 wrote to memory of 1276 2464 explorer.exe explorer.exe PID 2464 wrote to memory of 1276 2464 explorer.exe explorer.exe PID 2464 wrote to memory of 1276 2464 explorer.exe explorer.exe PID 2464 wrote to memory of 1276 2464 explorer.exe explorer.exe PID 2464 wrote to memory of 1276 2464 explorer.exe explorer.exe PID 2464 wrote to memory of 1764 2464 explorer.exe diskperf.exe PID 2464 wrote to memory of 1764 2464 explorer.exe diskperf.exe PID 2464 wrote to memory of 1764 2464 explorer.exe diskperf.exe PID 2464 wrote to memory of 1764 2464 explorer.exe diskperf.exe PID 2464 wrote to memory of 1764 2464 explorer.exe diskperf.exe PID 2464 wrote to memory of 1764 2464 explorer.exe diskperf.exe PID 1276 wrote to memory of 2228 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 2228 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 2228 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 2228 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 2268 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 2268 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 2268 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 2268 1276 explorer.exe spoolsv.exe PID 2268 wrote to memory of 1748 2268 spoolsv.exe WerFault.exe PID 2268 wrote to memory of 1748 2268 spoolsv.exe WerFault.exe PID 2268 wrote to memory of 1748 2268 spoolsv.exe WerFault.exe PID 2268 wrote to memory of 1748 2268 spoolsv.exe WerFault.exe PID 1276 wrote to memory of 1340 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 1340 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 1340 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 1340 1276 explorer.exe spoolsv.exe PID 1340 wrote to memory of 2192 1340 spoolsv.exe WerFault.exe PID 1340 wrote to memory of 2192 1340 spoolsv.exe WerFault.exe PID 1340 wrote to memory of 2192 1340 spoolsv.exe WerFault.exe PID 1340 wrote to memory of 2192 1340 spoolsv.exe WerFault.exe PID 1276 wrote to memory of 3016 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 3016 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 3016 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 3016 1276 explorer.exe spoolsv.exe PID 3016 wrote to memory of 1492 3016 spoolsv.exe WerFault.exe PID 3016 wrote to memory of 1492 3016 spoolsv.exe WerFault.exe PID 3016 wrote to memory of 1492 3016 spoolsv.exe WerFault.exe PID 3016 wrote to memory of 1492 3016 spoolsv.exe WerFault.exe PID 1276 wrote to memory of 1724 1276 explorer.exe spoolsv.exe PID 1276 wrote to memory of 1724 1276 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe"C:\Users\Admin\AppData\Local\Temp\0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe"C:\Users\Admin\AppData\Local\Temp\0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2228
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1748
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2192
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1492
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2184
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 366⤵
- Loads dropped DLL
- Program crash
PID:3000
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2348
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:1764
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD5cadf9a61b1390a36a29c01e118be8a20
SHA178ef4702848ffdd3819a2d323090d6a71f95f8a8
SHA2560e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbc
SHA51237bfce0b2626632018120116ec72685602d280826e4b6bc6ea187c8eda8d7f80f18f04f4ae0b7f72e04c44f122db0f51f2a090fcac750dce3d8709b00695d7de
-
Filesize
8.2MB
MD54be666a26da92e9a34714c24a1c33b2e
SHA1a82365614d214f5c68773742169591f5203b8fed
SHA2564bb2b1d986615eb9e66cdddee9a61d1baff32936ec54b463a3077c3405f770ac
SHA512fc94e176dc8c80c1e32d6fa466df4abe28b335a081ef977465b01fe93f85d3da71abc63917502fc67b8c58ea161785a9642cccdf5b47e98e12e6b66d463a1f2c
-
Filesize
8.2MB
MD5ddf241dca5fa37d28a544ec8b3254bed
SHA1bdfd3fc2a6dae16011ba0673b475143a76e742d0
SHA2567f0f4f7a13928f562cfda20ce33b787e38d15020f58c34590e7477aa55b0e3ff
SHA512d98da7ee70c255b6c247e67fa8534d99f6aef7fd2159a617e3f321cb2ee9aeac9a4e7ab585a8a861184ca7dc81e097f19dccc8dcb3bba46c52a603e6ccff7012