Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 01:27
Behavioral task
behavioral1
Sample
8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe
Resource
win10v2004-20241007-en
General
-
Target
8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe
-
Size
8.2MB
-
MD5
8a1754d1f5ef9b37e27a5106d310007f
-
SHA1
bfd7c126ec029446ca1ea03456d9e413222d8fcc
-
SHA256
8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55
-
SHA512
97de0000bd8f94bd92596b8aeeff50beb5a58fd38593274cdebe249852735a0374500bc3f72a2aa31a82d5db07bdbfd49887b1eb44a589712e6a824f7a0db1d7
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecS:V8e8e8f8e8e8f
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000019423-42.dat warzonerat behavioral1/files/0x000800000001937b-80.dat warzonerat behavioral1/files/0x0007000000019426-94.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0007000000019423-42.dat aspack_v212_v242 behavioral1/files/0x000800000001937b-80.dat aspack_v212_v242 behavioral1/files/0x0007000000019426-94.dat aspack_v212_v242 -
Executes dropped EXE 13 IoCs
pid Process 1096 explorer.exe 1072 explorer.exe 1504 spoolsv.exe 2216 spoolsv.exe 1300 spoolsv.exe 2412 spoolsv.exe 2312 spoolsv.exe 1736 spoolsv.exe 1064 spoolsv.exe 2556 spoolsv.exe 2592 spoolsv.exe 2244 spoolsv.exe 2252 svchost.exe -
Loads dropped DLL 64 IoCs
pid Process 2716 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 2716 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe 1072 explorer.exe 1072 explorer.exe 1252 WerFault.exe 1252 WerFault.exe 1252 WerFault.exe 1252 WerFault.exe 1252 WerFault.exe 1252 WerFault.exe 1252 WerFault.exe 1072 explorer.exe 1072 explorer.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 1072 explorer.exe 1072 explorer.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 1072 explorer.exe 1072 explorer.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 1072 explorer.exe 1072 explorer.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 2804 WerFault.exe 1072 explorer.exe 1072 explorer.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2688 set thread context of 2716 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 30 PID 2688 set thread context of 2668 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 31 PID 1096 set thread context of 1072 1096 explorer.exe 33 PID 1096 set thread context of 2828 1096 explorer.exe 34 PID 1504 set thread context of 2244 1504 spoolsv.exe 53 PID 1504 set thread context of 2600 1504 spoolsv.exe 54 -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 2088 2216 WerFault.exe 36 1252 1300 WerFault.exe 39 3064 2412 WerFault.exe 41 2180 2312 WerFault.exe 43 2732 1736 WerFault.exe 45 2804 1064 WerFault.exe 47 2836 2556 WerFault.exe 49 2564 2592 WerFault.exe 51 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2716 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1072 explorer.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2716 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 2716 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 2244 spoolsv.exe 2244 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2716 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 30 PID 2688 wrote to memory of 2716 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 30 PID 2688 wrote to memory of 2716 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 30 PID 2688 wrote to memory of 2716 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 30 PID 2688 wrote to memory of 2716 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 30 PID 2688 wrote to memory of 2716 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 30 PID 2688 wrote to memory of 2716 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 30 PID 2688 wrote to memory of 2716 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 30 PID 2688 wrote to memory of 2716 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 30 PID 2688 wrote to memory of 2668 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 31 PID 2688 wrote to memory of 2668 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 31 PID 2688 wrote to memory of 2668 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 31 PID 2688 wrote to memory of 2668 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 31 PID 2688 wrote to memory of 2668 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 31 PID 2688 wrote to memory of 2668 2688 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 31 PID 2716 wrote to memory of 1096 2716 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 32 PID 2716 wrote to memory of 1096 2716 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 32 PID 2716 wrote to memory of 1096 2716 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 32 PID 2716 wrote to memory of 1096 2716 8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe 32 PID 1096 wrote to memory of 1072 1096 explorer.exe 33 PID 1096 wrote to memory of 1072 1096 explorer.exe 33 PID 1096 wrote to memory of 1072 1096 explorer.exe 33 PID 1096 wrote to memory of 1072 1096 explorer.exe 33 PID 1096 wrote to memory of 1072 1096 explorer.exe 33 PID 1096 wrote to memory of 1072 1096 explorer.exe 33 PID 1096 wrote to memory of 1072 1096 explorer.exe 33 PID 1096 wrote to memory of 1072 1096 explorer.exe 33 PID 1096 wrote to memory of 1072 1096 explorer.exe 33 PID 1096 wrote to memory of 2828 1096 explorer.exe 34 PID 1096 wrote to memory of 2828 1096 explorer.exe 34 PID 1096 wrote to memory of 2828 1096 explorer.exe 34 PID 1096 wrote to memory of 2828 1096 explorer.exe 34 PID 1096 wrote to memory of 2828 1096 explorer.exe 34 PID 1096 wrote to memory of 2828 1096 explorer.exe 34 PID 1072 wrote to memory of 1504 1072 explorer.exe 35 PID 1072 wrote to memory of 1504 1072 explorer.exe 35 PID 1072 wrote to memory of 1504 1072 explorer.exe 35 PID 1072 wrote to memory of 1504 1072 explorer.exe 35 PID 1072 wrote to memory of 2216 1072 explorer.exe 36 PID 1072 wrote to memory of 2216 1072 explorer.exe 36 PID 1072 wrote to memory of 2216 1072 explorer.exe 36 PID 1072 wrote to memory of 2216 1072 explorer.exe 36 PID 2216 wrote to memory of 2088 2216 spoolsv.exe 37 PID 2216 wrote to memory of 2088 2216 spoolsv.exe 37 PID 2216 wrote to memory of 2088 2216 spoolsv.exe 37 PID 2216 wrote to memory of 2088 2216 spoolsv.exe 37 PID 1072 wrote to memory of 1300 1072 explorer.exe 39 PID 1072 wrote to memory of 1300 1072 explorer.exe 39 PID 1072 wrote to memory of 1300 1072 explorer.exe 39 PID 1072 wrote to memory of 1300 1072 explorer.exe 39 PID 1300 wrote to memory of 1252 1300 spoolsv.exe 40 PID 1300 wrote to memory of 1252 1300 spoolsv.exe 40 PID 1300 wrote to memory of 1252 1300 spoolsv.exe 40 PID 1300 wrote to memory of 1252 1300 spoolsv.exe 40 PID 1072 wrote to memory of 2412 1072 explorer.exe 41 PID 1072 wrote to memory of 2412 1072 explorer.exe 41 PID 1072 wrote to memory of 2412 1072 explorer.exe 41 PID 1072 wrote to memory of 2412 1072 explorer.exe 41 PID 2412 wrote to memory of 3064 2412 spoolsv.exe 42 PID 2412 wrote to memory of 3064 2412 spoolsv.exe 42 PID 2412 wrote to memory of 3064 2412 spoolsv.exe 42 PID 2412 wrote to memory of 3064 2412 spoolsv.exe 42 PID 1072 wrote to memory of 2312 1072 explorer.exe 43 PID 1072 wrote to memory of 2312 1072 explorer.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe"C:\Users\Admin\AppData\Local\Temp\8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe"C:\Users\Admin\AppData\Local\Temp\8bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1096 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1504 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2244 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:2600
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2088
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1252
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 366⤵
- Loads dropped DLL
- Program crash
PID:3064
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2180
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2804
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 366⤵
- Program crash
PID:2564
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:2828
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD58a1754d1f5ef9b37e27a5106d310007f
SHA1bfd7c126ec029446ca1ea03456d9e413222d8fcc
SHA2568bd0e8081ba615b62548e3c086749fb2d2fc55f49a3bd0797f40ea755b7eec55
SHA51297de0000bd8f94bd92596b8aeeff50beb5a58fd38593274cdebe249852735a0374500bc3f72a2aa31a82d5db07bdbfd49887b1eb44a589712e6a824f7a0db1d7
-
Filesize
8.2MB
MD554bd5cff50e465ebc5919705b41f9583
SHA17d1a474e6c40faf526327a7cfca3b40e14a567f6
SHA256c1a2eb1e70637901e38dc87879897a9b5595c7a801296e6327401e289611c057
SHA512d462279bd686e333ed3833385761cf91978fc8b86fb77a8c459236057fde466c003b4ff08d7a5dfd75644fff6507b53781a1de3e0c74f6219e03e869868d4cdf
-
Filesize
8.2MB
MD5ae72954d46ba87470a57679785b4a5f4
SHA1f443ce91f851f192f7caa700c698e85a1875e43c
SHA256c01b05d7170e2c1310bfbd1c2e8f79af72b7bf9d91688321f6fbb1b81b314eef
SHA512077ced22d2d45d1b8507f1862698cc74e918d9cec94eabd474aa97e7b4a980a6efebc94cc6cc49fcc522107b1998a1e30d5daa6b2a0842f3b2839a940cc4e838