Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 00:56
Behavioral task
behavioral1
Sample
a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe
Resource
win10v2004-20241007-en
General
-
Target
a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe
-
Size
8.2MB
-
MD5
1676f281472a8a97de4a3377c387245c
-
SHA1
0595a91ddc01019e8c67bc36cbb9bdf1588d4c1d
-
SHA256
a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350
-
SHA512
b3fb1ee94a0b96f284383ea011d8ede5931313e55516957950e5fdbc0797bb30b4f0de8b47e6c4059c3c055112728bbe3029f8759e16ac79abf959f6bbf5e318
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNech:V8e8e8f8e8e86
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x0009000000016d21-42.dat warzonerat behavioral1/files/0x0008000000016d0e-78.dat warzonerat behavioral1/files/0x0008000000016d31-93.dat warzonerat behavioral1/memory/2740-248-0x0000000003270000-0x0000000003384000-memory.dmp warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0009000000016d21-42.dat aspack_v212_v242 behavioral1/files/0x0008000000016d0e-78.dat aspack_v212_v242 behavioral1/files/0x0008000000016d31-93.dat aspack_v212_v242 -
Executes dropped EXE 13 IoCs
pid Process 3020 explorer.exe 2872 explorer.exe 1980 spoolsv.exe 2192 spoolsv.exe 2176 spoolsv.exe 1944 spoolsv.exe 972 spoolsv.exe 1140 spoolsv.exe 3032 spoolsv.exe 2780 spoolsv.exe 2572 spoolsv.exe 2740 spoolsv.exe 624 svchost.exe -
Loads dropped DLL 64 IoCs
pid Process 3060 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 3060 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2872 explorer.exe 2872 explorer.exe 1112 WerFault.exe 1112 WerFault.exe 1112 WerFault.exe 1112 WerFault.exe 1112 WerFault.exe 1112 WerFault.exe 1112 WerFault.exe 2872 explorer.exe 2872 explorer.exe 1480 WerFault.exe 1480 WerFault.exe 1480 WerFault.exe 1480 WerFault.exe 1480 WerFault.exe 1480 WerFault.exe 1480 WerFault.exe 2872 explorer.exe 2872 explorer.exe 1712 WerFault.exe 1712 WerFault.exe 1712 WerFault.exe 1712 WerFault.exe 1712 WerFault.exe 1712 WerFault.exe 1712 WerFault.exe 2872 explorer.exe 2872 explorer.exe 316 WerFault.exe 316 WerFault.exe 316 WerFault.exe 316 WerFault.exe 316 WerFault.exe 316 WerFault.exe 316 WerFault.exe 2872 explorer.exe 2872 explorer.exe 1532 WerFault.exe 1532 WerFault.exe 1532 WerFault.exe 1532 WerFault.exe 1532 WerFault.exe 1532 WerFault.exe 1532 WerFault.exe 2872 explorer.exe 2872 explorer.exe 2844 WerFault.exe 2844 WerFault.exe 2844 WerFault.exe 2844 WerFault.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2736 set thread context of 3060 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 31 PID 2736 set thread context of 484 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 32 PID 3020 set thread context of 2872 3020 explorer.exe 34 PID 3020 set thread context of 1892 3020 explorer.exe 35 PID 1980 set thread context of 2740 1980 spoolsv.exe 53 PID 1980 set thread context of 880 1980 spoolsv.exe 54 -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 2408 2192 WerFault.exe 37 1112 2176 WerFault.exe 39 1480 1944 WerFault.exe 41 1712 972 WerFault.exe 43 316 1140 WerFault.exe 45 1532 3032 WerFault.exe 47 2844 2780 WerFault.exe 49 2668 2572 WerFault.exe 51 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3060 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2872 explorer.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3060 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 3060 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2740 spoolsv.exe 2740 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3060 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 31 PID 2736 wrote to memory of 3060 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 31 PID 2736 wrote to memory of 3060 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 31 PID 2736 wrote to memory of 3060 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 31 PID 2736 wrote to memory of 3060 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 31 PID 2736 wrote to memory of 3060 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 31 PID 2736 wrote to memory of 3060 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 31 PID 2736 wrote to memory of 3060 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 31 PID 2736 wrote to memory of 3060 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 31 PID 2736 wrote to memory of 484 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 32 PID 2736 wrote to memory of 484 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 32 PID 2736 wrote to memory of 484 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 32 PID 2736 wrote to memory of 484 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 32 PID 2736 wrote to memory of 484 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 32 PID 2736 wrote to memory of 484 2736 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 32 PID 3060 wrote to memory of 3020 3060 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 33 PID 3060 wrote to memory of 3020 3060 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 33 PID 3060 wrote to memory of 3020 3060 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 33 PID 3060 wrote to memory of 3020 3060 a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe 33 PID 3020 wrote to memory of 2872 3020 explorer.exe 34 PID 3020 wrote to memory of 2872 3020 explorer.exe 34 PID 3020 wrote to memory of 2872 3020 explorer.exe 34 PID 3020 wrote to memory of 2872 3020 explorer.exe 34 PID 3020 wrote to memory of 2872 3020 explorer.exe 34 PID 3020 wrote to memory of 2872 3020 explorer.exe 34 PID 3020 wrote to memory of 2872 3020 explorer.exe 34 PID 3020 wrote to memory of 2872 3020 explorer.exe 34 PID 3020 wrote to memory of 2872 3020 explorer.exe 34 PID 3020 wrote to memory of 1892 3020 explorer.exe 35 PID 3020 wrote to memory of 1892 3020 explorer.exe 35 PID 3020 wrote to memory of 1892 3020 explorer.exe 35 PID 3020 wrote to memory of 1892 3020 explorer.exe 35 PID 3020 wrote to memory of 1892 3020 explorer.exe 35 PID 3020 wrote to memory of 1892 3020 explorer.exe 35 PID 2872 wrote to memory of 1980 2872 explorer.exe 36 PID 2872 wrote to memory of 1980 2872 explorer.exe 36 PID 2872 wrote to memory of 1980 2872 explorer.exe 36 PID 2872 wrote to memory of 1980 2872 explorer.exe 36 PID 2872 wrote to memory of 2192 2872 explorer.exe 37 PID 2872 wrote to memory of 2192 2872 explorer.exe 37 PID 2872 wrote to memory of 2192 2872 explorer.exe 37 PID 2872 wrote to memory of 2192 2872 explorer.exe 37 PID 2192 wrote to memory of 2408 2192 spoolsv.exe 38 PID 2192 wrote to memory of 2408 2192 spoolsv.exe 38 PID 2192 wrote to memory of 2408 2192 spoolsv.exe 38 PID 2192 wrote to memory of 2408 2192 spoolsv.exe 38 PID 2872 wrote to memory of 2176 2872 explorer.exe 39 PID 2872 wrote to memory of 2176 2872 explorer.exe 39 PID 2872 wrote to memory of 2176 2872 explorer.exe 39 PID 2872 wrote to memory of 2176 2872 explorer.exe 39 PID 2176 wrote to memory of 1112 2176 spoolsv.exe 40 PID 2176 wrote to memory of 1112 2176 spoolsv.exe 40 PID 2176 wrote to memory of 1112 2176 spoolsv.exe 40 PID 2176 wrote to memory of 1112 2176 spoolsv.exe 40 PID 2872 wrote to memory of 1944 2872 explorer.exe 41 PID 2872 wrote to memory of 1944 2872 explorer.exe 41 PID 2872 wrote to memory of 1944 2872 explorer.exe 41 PID 2872 wrote to memory of 1944 2872 explorer.exe 41 PID 1944 wrote to memory of 1480 1944 spoolsv.exe 42 PID 1944 wrote to memory of 1480 1944 spoolsv.exe 42 PID 1944 wrote to memory of 1480 1944 spoolsv.exe 42 PID 1944 wrote to memory of 1480 1944 spoolsv.exe 42 PID 2872 wrote to memory of 972 2872 explorer.exe 43 PID 2872 wrote to memory of 972 2872 explorer.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe"C:\Users\Admin\AppData\Local\Temp\a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe"C:\Users\Admin\AppData\Local\Temp\a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1980 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2740 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:624
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:880
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2408
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1112
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1480
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1712
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 366⤵
- Loads dropped DLL
- Program crash
PID:316
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1532
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2844
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 366⤵
- Program crash
PID:2668
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:1892
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:484
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD51676f281472a8a97de4a3377c387245c
SHA10595a91ddc01019e8c67bc36cbb9bdf1588d4c1d
SHA256a7e1edb45f333e5729fae4d06ee14d60b018b2b1ac68a9168ad741130dcd5350
SHA512b3fb1ee94a0b96f284383ea011d8ede5931313e55516957950e5fdbc0797bb30b4f0de8b47e6c4059c3c055112728bbe3029f8759e16ac79abf959f6bbf5e318
-
Filesize
8.2MB
MD5a32f44b39b1d110c754cfefa29fffc89
SHA19b83e13e493280417fb1a04785c5ce92cb3898b6
SHA2562b1b41519b8a99479e52041a8e6a1b09069f8e4a199216b3fb3b765f333dd6b2
SHA51284582f8afe66659460f2114402b0ce116ddcbb6a43cb5137e07665d39eb94dc8141c0ce9ad54df021b0f05c68611d1d8eb0ee9c7f7274b1156b8a98ad7833eef
-
Filesize
8.2MB
MD5bfd3ccc7feb2b3e9ffef5ffc2be63ed6
SHA1486177fe670ccd2895a8d0a18cb3f7ba2818f0f8
SHA256eb8dbbceb87513f72ba400036532ed2da0c844f331d12c79b5a9b521ca9649b9
SHA51269ff4f20d91ac239203695cfc8830afee0d5f2d1a45694a08731cf900ed6aef0a575ba46aa52cddafee9fb6e2f397d69b2084d85e87219bbd821fa91fc4a5dc9