Analysis

  • max time kernel
    113s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2024 18:45

General

  • Target

    6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe

  • Size

    375KB

  • MD5

    85b43fd8aa9d8b09b8613f2fa47c6bb0

  • SHA1

    3729c0739c24b7ed9fda30684173a869c7398e80

  • SHA256

    6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9

  • SHA512

    2898dc0c44a6543136281cf0bbdc03c3cc958098366773fc31ab047c2819e9df3d2b5596ded0d9a2811d915d4ced0404494dfa3381572c56dda9bf2772706ef2

  • SSDEEP

    6144:YbqQ4i1FFiEKZVSQZzs5jQKbgQ203StbjjSQkzaozVVqH:CpliPScgCy73StbjjSQkVzV0H

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Authenticator

C2

iamaskibiditoilet-58299.portmap.host:58299

Mutex

QSR_MUTEX_bNzknSVeSVx21JnqhQ

Attributes
  • encryption_key

    wAIAzlOLR0d5V3YI1aCM

  • install_name

    Runtime Broker.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Runtime Broker

  • subdirectory

    SubDir

Signatures

  • Quasar RAT 3 IoCs

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 57 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 11 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 11 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe
    "C:\Users\Admin\AppData\Local\Temp\6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe"
    1⤵
    • Quasar RAT
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3184
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe" /rl HIGHEST /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:4836
    • C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:3600
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qj5GeGgne2va.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1952
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3728
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 10 localhost
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:808
        • C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2616
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:3500
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jRckzECsMjoe.bat" "
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2348
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4840
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 10 localhost
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:1312
            • C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe
              "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1580
              • C:\Windows\SysWOW64\schtasks.exe
                "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:2212
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FttEFZkOVT2d.bat" "
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3520
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3324
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:3744
                • C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"
                  8⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:4828
                  • C:\Windows\SysWOW64\schtasks.exe
                    "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:4872
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\56GtoKePXD1n.bat" "
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:5104
                    • C:\Windows\SysWOW64\chcp.com
                      chcp 65001
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:1952
                    • C:\Windows\SysWOW64\PING.EXE
                      ping -n 10 localhost
                      10⤵
                      • System Location Discovery: System Language Discovery
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:2456
                    • C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe
                      "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"
                      10⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of SetWindowsHookEx
                      PID:2504
                      • C:\Windows\SysWOW64\schtasks.exe
                        "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f
                        11⤵
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:4928
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FrMxqg2uh3SH.bat" "
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:436
                        • C:\Windows\SysWOW64\chcp.com
                          chcp 65001
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:4804
                        • C:\Windows\SysWOW64\PING.EXE
                          ping -n 10 localhost
                          12⤵
                          • System Location Discovery: System Language Discovery
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Runs ping.exe
                          PID:1792
                        • C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe
                          "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"
                          12⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of SetWindowsHookEx
                          PID:4012
                          • C:\Windows\SysWOW64\schtasks.exe
                            "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f
                            13⤵
                            • System Location Discovery: System Language Discovery
                            • Scheduled Task/Job: Scheduled Task
                            PID:4992
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J7TTJ5e0e8Jx.bat" "
                            13⤵
                            • System Location Discovery: System Language Discovery
                            PID:772
                            • C:\Windows\SysWOW64\chcp.com
                              chcp 65001
                              14⤵
                              • System Location Discovery: System Language Discovery
                              PID:4080
                            • C:\Windows\SysWOW64\PING.EXE
                              ping -n 10 localhost
                              14⤵
                              • System Location Discovery: System Language Discovery
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:2724
                            • C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe
                              "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"
                              14⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of SetWindowsHookEx
                              PID:4452
                              • C:\Windows\SysWOW64\schtasks.exe
                                "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f
                                15⤵
                                • System Location Discovery: System Language Discovery
                                • Scheduled Task/Job: Scheduled Task
                                PID:4428
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\b45iWQHxSaW0.bat" "
                                15⤵
                                • System Location Discovery: System Language Discovery
                                PID:3720
                                • C:\Windows\SysWOW64\chcp.com
                                  chcp 65001
                                  16⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4200
                                • C:\Windows\SysWOW64\PING.EXE
                                  ping -n 10 localhost
                                  16⤵
                                  • System Location Discovery: System Language Discovery
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:4440
                                • C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe
                                  "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"
                                  16⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of SetWindowsHookEx
                                  PID:3548
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f
                                    17⤵
                                    • System Location Discovery: System Language Discovery
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:4156
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A6FWQAmKiBJT.bat" "
                                    17⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2692
                                    • C:\Windows\SysWOW64\chcp.com
                                      chcp 65001
                                      18⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4144
                                    • C:\Windows\SysWOW64\PING.EXE
                                      ping -n 10 localhost
                                      18⤵
                                      • System Location Discovery: System Language Discovery
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:3540
                                    • C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe
                                      "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"
                                      18⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2752
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f
                                        19⤵
                                        • System Location Discovery: System Language Discovery
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:704
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IuGMYxLHm6id.bat" "
                                        19⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4892
                                        • C:\Windows\SysWOW64\chcp.com
                                          chcp 65001
                                          20⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2716
                                        • C:\Windows\SysWOW64\PING.EXE
                                          ping -n 10 localhost
                                          20⤵
                                          • System Location Discovery: System Language Discovery
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:3832
                                        • C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe
                                          "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"
                                          20⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2984
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f
                                            21⤵
                                            • System Location Discovery: System Language Discovery
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1556
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KDJe7p9peGXz.bat" "
                                            21⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4624
                                            • C:\Windows\SysWOW64\chcp.com
                                              chcp 65001
                                              22⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2904
                                            • C:\Windows\SysWOW64\PING.EXE
                                              ping -n 10 localhost
                                              22⤵
                                              • System Location Discovery: System Language Discovery
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              • Runs ping.exe
                                              PID:3256
                                            • C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe
                                              "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"
                                              22⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of SetWindowsHookEx
                                              PID:4844
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f
                                                23⤵
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3080
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2lGkMFaucRbB.bat" "
                                                23⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:5036
                                                • C:\Windows\SysWOW64\chcp.com
                                                  chcp 65001
                                                  24⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1084
                                                • C:\Windows\SysWOW64\PING.EXE
                                                  ping -n 10 localhost
                                                  24⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Runs ping.exe
                                                  PID:1444
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 2224
                                                23⤵
                                                • Program crash
                                                PID:1772
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 2200
                                            21⤵
                                            • Program crash
                                            PID:3552
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 2224
                                        19⤵
                                        • Program crash
                                        PID:2540
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 2224
                                    17⤵
                                    • Program crash
                                    PID:2216
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 2192
                                15⤵
                                • Program crash
                                PID:4772
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 2192
                            13⤵
                            • Program crash
                            PID:2212
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 2224
                        11⤵
                        • Program crash
                        PID:1312
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 2200
                    9⤵
                    • Program crash
                    PID:1032
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 1928
                7⤵
                • Program crash
                PID:4612
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 2224
            5⤵
            • Program crash
            PID:5088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 2192
        3⤵
        • Program crash
        PID:2036
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2184 -ip 2184
    1⤵
      PID:4076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2616 -ip 2616
      1⤵
        PID:2504
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1580 -ip 1580
        1⤵
          PID:4992
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4828 -ip 4828
          1⤵
            PID:5036
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2504 -ip 2504
            1⤵
              PID:5048
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4012 -ip 4012
              1⤵
                PID:4344
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4452 -ip 4452
                1⤵
                  PID:1536
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3548 -ip 3548
                  1⤵
                    PID:3012
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2752 -ip 2752
                    1⤵
                      PID:692
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2984 -ip 2984
                      1⤵
                        PID:868
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4844 -ip 4844
                        1⤵
                          PID:4772

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\2lGkMFaucRbB.bat

                          Filesize

                          215B

                          MD5

                          b66e744a863c0f9ecbf40de9dd1a4c23

                          SHA1

                          e235c20193a50b625568b2a218dc240986348496

                          SHA256

                          86e89439890e3ca3cf3ed35dbd792dc8677386b7d9aad79596744414d98660c3

                          SHA512

                          ad292e65e60a5420babec4b671b3adfa874e65e84375bbdfa7663cf66faf618bc307e4d7207755b9691d57e6dec06b184adcb22fa02ca66bfe3a47c10e480931

                        • C:\Users\Admin\AppData\Local\Temp\56GtoKePXD1n.bat

                          Filesize

                          215B

                          MD5

                          55ffbda355c96d78796d5e5468142f28

                          SHA1

                          264c04f3564c0a27d2c6492069a746a12b83c73a

                          SHA256

                          cc85cfddc6a7f8d6b54be4eb27f11a1bb283f013afbce7233d8062e4a4b65e3b

                          SHA512

                          52608cd68e79bd631c294e398ee08de72c19e5202ca7bc63c4ba1bfac537dc44736ececb9db8342986dbebd7542eacc2f1b4e27ef3faf4d0f90c678d2dde3745

                        • C:\Users\Admin\AppData\Local\Temp\A6FWQAmKiBJT.bat

                          Filesize

                          215B

                          MD5

                          6c0c488d5d31794d945a06887200e305

                          SHA1

                          208e907d3ed182aa02ed1324a0456f33182fba81

                          SHA256

                          b76704f81d8df55353adaf0b67a28c6f485533cf38544b925eecb6b86b8e2858

                          SHA512

                          522e2cd48163a25db80872d4d02689c7326a8ead879ff13c8046febd413393c980f97c7444557ca72c55fedf11dc9819a8a0281f1c36ef899ecf1ddaa0e08129

                        • C:\Users\Admin\AppData\Local\Temp\FrMxqg2uh3SH.bat

                          Filesize

                          215B

                          MD5

                          9ae9e941e70a645ea93ca6f991f5d4c2

                          SHA1

                          be0d132140fac962f54637ac053fb38878c1fcdc

                          SHA256

                          2a2651e70822a76e05d5e0a6ba869d1dbe0ddbdffb9d2d4773c2c25f6aef5943

                          SHA512

                          5bdf21d2dfd9d59d3f1ba8b0bac94c2b5770b222111107d209f93506513e675e3e32536d9c7a4cf54a55c5ad5b1c216953232b3f62439d2b1e9224b53e2449d9

                        • C:\Users\Admin\AppData\Local\Temp\FttEFZkOVT2d.bat

                          Filesize

                          215B

                          MD5

                          dcc8b6a927c6a7c890f15b127a98d84e

                          SHA1

                          f2d7bc4e6a43cb0f2ac87ec87b3cb41d8e58168d

                          SHA256

                          d63e51c77ee114d16a7c4eb56838ababe3a2303b45ba5fab1f2fc2f3b0903df5

                          SHA512

                          9df05a5fba1f0e599c7c578c5e5b4935b7aa7d94174230b2c80f95f1ec5d33ba4905dedc3f48bf89ec62eed5342839df59e9ccbb65e0546763aff3cdcac113c7

                        • C:\Users\Admin\AppData\Local\Temp\IuGMYxLHm6id.bat

                          Filesize

                          215B

                          MD5

                          525a6d552714b9897f5fc10a121629c3

                          SHA1

                          f5c63a2b5ed3dba598e00e701417d7457369d46f

                          SHA256

                          ad00e8e9c8d8cd047e15fb06d7126a9147c388849981c4c53c1649591e4f65ae

                          SHA512

                          2a16f1165bcc58ad1520be4e125f914165d8e2402cb55bc9b935eb3750d9ab6f7ee6d64e10a4ecf29f6ab437411becb8334c1cf3ac424493225a5ba0aec6f8a0

                        • C:\Users\Admin\AppData\Local\Temp\J7TTJ5e0e8Jx.bat

                          Filesize

                          215B

                          MD5

                          563ea475330a35485c9fc74f49afeeaa

                          SHA1

                          efa37e0a1166367384282b01ed6201dc5aa4901a

                          SHA256

                          0c7a382faa72cfb3887255be5c2b2ef36438a57a86926d3367eb8c4897b3b2ca

                          SHA512

                          b64e116d6a02ae329a9db95d6ddac05cae275fddc5a84fa535d81b6f97487f38d75ebb7f97ead0c49249ef5a3bbdbd0add80f1aae5c83a67439214cb14eb7295

                        • C:\Users\Admin\AppData\Local\Temp\KDJe7p9peGXz.bat

                          Filesize

                          215B

                          MD5

                          1be9a09447b7354e82e5610b8f9f6970

                          SHA1

                          da4e0029fd5ff2e0c588530033eab8080acf61f8

                          SHA256

                          196dd02ced756a82c1ae6fb6ad38b2906d686ac4040c4f62e7c373f1417fa819

                          SHA512

                          e8b46cb343a96e5d85de0c58b30e40668343f616835b7b4eb10dfe9622088a72f5d3c9edaa5642d872aba8cbbff99ae2d3516e9c3c4fd6f92cb18c373707822d

                        • C:\Users\Admin\AppData\Local\Temp\b45iWQHxSaW0.bat

                          Filesize

                          215B

                          MD5

                          42337550585f9c1b0f412789f999dd0c

                          SHA1

                          25563019b3cc5c7078f01a5ebd1c61f9e27e52f1

                          SHA256

                          f50560cf0b6918fedc5f6514844bfa96c6cc0419047316b8b6a832b6f7ad7710

                          SHA512

                          907828d57a3f780cc53e3a23cf6b740dfb1fc92fd1a96d611840e5bbf0238ce7ea7677bd0fc21fea03862c4272e0af635385066a476005ffd18c834f9fba4d2e

                        • C:\Users\Admin\AppData\Local\Temp\jRckzECsMjoe.bat

                          Filesize

                          215B

                          MD5

                          cdffee983950190c7149328fb43b77e1

                          SHA1

                          4e0f438d73da0750ffa3270782269baeaa8c326d

                          SHA256

                          2df83be50f020d812f9cd949b648b25b5d8b0fe558d8bd8f4eda2e1566755237

                          SHA512

                          f75a73f781fb6d1da40e7b43aad0e8f5fd670b9056dce98117c3e1ce2ae65c0ef73e8e0eae0d4be758cc4a42acdfd79f762182fd673d43c4caff53dbeb2c0bef

                        • C:\Users\Admin\AppData\Local\Temp\qj5GeGgne2va.bat

                          Filesize

                          215B

                          MD5

                          18e0429b75f8772edc53265b1a68815c

                          SHA1

                          a42ee4d098c6f3211592992220f65ef301199db6

                          SHA256

                          a9cf5d7d92cab6e9e57828a5533d6d38175454c5f142bccaa0ddf37a14387dad

                          SHA512

                          f3bc4d8c3fc4807bbb8272ce03427480a8b613f718c0cff34398e1dbb8dfbb080c807c1db4b453bd4164de23da95a73d9d38959e8079062796539af420d17718

                        • C:\Users\Admin\AppData\Roaming\Logs\12-30-2024

                          Filesize

                          224B

                          MD5

                          3449c8552faa8dc88552cbdb2f7484a9

                          SHA1

                          c3ce31b299d11d903c323e055b701e55c9cde7a2

                          SHA256

                          5c90102fb203f5cdc0e07edff2446cf7fe7c0952dc57a3e408d88ca05268cd2f

                          SHA512

                          95f0b99eb3145581922f1261e39fb3cbdbcdf0a6677a1a49f8605c73a30302bc28c05fba42e641853e7a52f4531219d9cf021233c97dbbba08442293094bdd89

                        • C:\Users\Admin\AppData\Roaming\Logs\12-30-2024

                          Filesize

                          224B

                          MD5

                          ed27f122a6afe5d1adc76ed77262376a

                          SHA1

                          4d50461bc34ca7d3d2fd071cec051d249ebd553f

                          SHA256

                          9f0271bb58fc5363c004daf3ed32b29cd94776d2665a6ed5de48c89946399528

                          SHA512

                          1d8f3e4c0a7e5536613ef18af491479b733e0ea61256ade39bab4960ecbf230e03299bd18f6ab9e50723084e7c244c9437607c220f943a1dedc51aa6de58c470

                        • C:\Users\Admin\AppData\Roaming\Logs\12-30-2024

                          Filesize

                          224B

                          MD5

                          03f9c5a4072044278b36f50e8863b5b4

                          SHA1

                          1584240233225d7aee07e6d6c9ccc9c1553fa0b8

                          SHA256

                          ba8f7710c7bccff32adb93e2db0438aa55f11e07c47044e4c4a086d55932e470

                          SHA512

                          7bb078cc7f366605a499e81d7d2f4dfa043c208bc53dece80b8e9b5242e39ff2ee7cef5f7da78bf5256057edb56ad8fb727e4579a9f8b56b9229252f0f3d0fa4

                        • C:\Users\Admin\AppData\Roaming\Logs\12-30-2024

                          Filesize

                          224B

                          MD5

                          5f8f383c028c7a19a65a7e546d9ab8db

                          SHA1

                          8193e4f09071fa6ecd106a9357fb075d25fac094

                          SHA256

                          d0277e4fed2e843fee81116b52ea043f987386154b558d7ff0a09839a56687d3

                          SHA512

                          40d0e684f9bfb29203a043b79d5a86b9a2e595ad594a7847b792ca16a83763bede8d19c2b71db70a00dcf71cb559870b29d20c0ba57613c1ab255d15753b3f9e

                        • C:\Users\Admin\AppData\Roaming\Logs\12-30-2024

                          Filesize

                          224B

                          MD5

                          42ae4a8196b82902ff103a4e74043dd6

                          SHA1

                          5c320de5853eae00229adc3b410386b049c98cc7

                          SHA256

                          e8d75af9e2493378e10cce0324032b487034c98a0b704519399a24478a6f1ba8

                          SHA512

                          7e9609bcaac79748c8eafb95124b705dfef3e1637cd9b70121157965ec8a17b38bf40a95ca026f56daf9aa03a775218840114ab091c6fac56fb68a6b78471f6a

                        • C:\Users\Admin\AppData\Roaming\Logs\12-30-2024

                          Filesize

                          224B

                          MD5

                          f53e5d27e088f6a8db7887949deff6c2

                          SHA1

                          8e232e01abf71767d87a76a72b3f20529c32a47f

                          SHA256

                          c4e4f9f3295e2a5da0f14922c3161dba6436f0d06940d2f22192a70392c78139

                          SHA512

                          296b226215be03b2b0c0819c09c13695e68258bdb5f2212c63f60666f4b58999668e44df61f21e7a96ff964bce8189fcdba0d1df811e1598171c54ccbf898c5f

                        • C:\Users\Admin\AppData\Roaming\Logs\12-30-2024

                          Filesize

                          224B

                          MD5

                          42e3fcd342c98749c3c48b78fccb84f0

                          SHA1

                          5db2da5c3a13f69984d53b615ee6681149e7cfac

                          SHA256

                          132fb9e3c874eafe7fc95df1c2b9cc475d780e594f2058d8e97791c940064268

                          SHA512

                          208b7a0c8373c91eb3703119ef6463dbfffe7f0500858803550fd5531b512e0f471a5c2df9b9fb2604292fbdb9ccccd30fd8b2decbd9092fedf0b235723dc2b1

                        • C:\Users\Admin\AppData\Roaming\Logs\12-30-2024

                          Filesize

                          224B

                          MD5

                          3fdc0161990de1fbd4b7cb5ce954d095

                          SHA1

                          dd985f011c27627aeb8e63e6bdf79e5ce2edbdb9

                          SHA256

                          bca29e4e62dce5f7df4398333452c585a8913bf40f505cf80234cb8df5bff0a2

                          SHA512

                          1668a5106dafbe61a993d32692699320b44c6463e197ed873ed6fac2b10a9919720a4b940b7de555134bf94c8e03e8d06aa5994b02b13a9f4be2b24dbc915680

                        • C:\Users\Admin\AppData\Roaming\Logs\12-30-2024

                          Filesize

                          224B

                          MD5

                          a0967dc6077e18d62c2ba1bcee9c5457

                          SHA1

                          9c36844e33b259f6474447babe45ba8d0fa5e3a9

                          SHA256

                          8181187054a00eac698878677a6b92922c2bad75010662d5c5afb79e55b26e5e

                          SHA512

                          2933bd6aa2114c9261d36dcba85a56a00a6653ead6602dd693b2a52cd44ace0a035b499694efc8e14da4d2fe8ca1623782c03e49235a7fe4e74b5b54c94da75c

                        • C:\Users\Admin\AppData\Roaming\Logs\12-30-2024

                          Filesize

                          224B

                          MD5

                          12ad805acebdaf998dd7e52428f7c996

                          SHA1

                          e453e1def358ecfc074cf2a4d87ae2a2c8eccfc0

                          SHA256

                          f9f33003e2914a8927f68ebf76c1e61f7cc2b3385121a4f4fcf276f309971c84

                          SHA512

                          f1b72dc351f3357a0fd5303c82512bbbe4cf33bcef49a957187852e5cd0e82d1280e24806100631524c31f63796e05784e77a8a73d726d90b241d89d166b8b07

                        • C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe

                          Filesize

                          375KB

                          MD5

                          85b43fd8aa9d8b09b8613f2fa47c6bb0

                          SHA1

                          3729c0739c24b7ed9fda30684173a869c7398e80

                          SHA256

                          6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9

                          SHA512

                          2898dc0c44a6543136281cf0bbdc03c3cc958098366773fc31ab047c2819e9df3d2b5596ded0d9a2811d915d4ced0404494dfa3381572c56dda9bf2772706ef2

                        • memory/2184-23-0x0000000074DF0000-0x00000000755A0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2184-14-0x0000000074DF0000-0x00000000755A0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2184-18-0x00000000061C0000-0x00000000061CA000-memory.dmp

                          Filesize

                          40KB

                        • memory/2184-16-0x0000000074DF0000-0x00000000755A0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3184-7-0x00000000064B0000-0x00000000064EC000-memory.dmp

                          Filesize

                          240KB

                        • memory/3184-5-0x0000000005350000-0x00000000053B6000-memory.dmp

                          Filesize

                          408KB

                        • memory/3184-4-0x0000000074DF0000-0x00000000755A0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3184-6-0x00000000058B0000-0x00000000058C2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3184-3-0x0000000005240000-0x00000000052D2000-memory.dmp

                          Filesize

                          584KB

                        • memory/3184-15-0x0000000074DF0000-0x00000000755A0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3184-2-0x0000000005900000-0x0000000005EA4000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/3184-0-0x0000000074DFE000-0x0000000074DFF000-memory.dmp

                          Filesize

                          4KB

                        • memory/3184-1-0x00000000007D0000-0x0000000000834000-memory.dmp

                          Filesize

                          400KB