Analysis
-
max time kernel
130s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 13:16
Static task
static1
General
-
Target
8e46290218d0378d02763e5c7168baacb70e9b551c9977608e4ecb7756c9868a.exe
-
Size
1.0MB
-
MD5
6b33a8269ed193e0b44edcc6754676d7
-
SHA1
e99b58212dae9e5fbb220c76be656e6b1271cf49
-
SHA256
8e46290218d0378d02763e5c7168baacb70e9b551c9977608e4ecb7756c9868a
-
SHA512
5be675757ae25333c46ad11fa087e25227fccd0ad27bd97ac22a256e91cbea8a11decbb4c8ab1659e4f16e5afbdf217e2fb9d5a34b4c56cbbc6fb0f20b3bc8a8
-
SSDEEP
24576:jEBb3XCrU5gVN4m1eGqMflGWcqDXixIPzge0ftWP7:qiEgV6m1eGNXc1x+ctM
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rako
193.233.20.28:4125
-
auth_value
69e2d139981e0b037a6786e01a92824d
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bus6777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bus6777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" con5072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" con5072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b6518UU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c24wR45.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection con5072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" con5072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c24wR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c24wR45.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bus6777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bus6777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b6518UU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c24wR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bus6777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bus6777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" con5072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" con5072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b6518UU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b6518UU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b6518UU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c24wR45.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1212-211-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-212-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-214-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-216-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-218-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-220-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-222-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-224-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-226-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-228-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-230-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-232-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-234-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-236-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-238-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-240-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-242-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1212-521-0x0000000004B80000-0x0000000004B90000-memory.dmp family_redline -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation ge295591.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation metafor.exe -
Executes dropped EXE 17 IoCs
pid Process 1952 kino5452.exe 1828 kino6285.exe 2288 kino7259.exe 4348 bus6777.exe 2096 con5072.exe 1212 dTK81s04.exe 4876 en982480.exe 1548 ge295591.exe 4564 metafor.exe 748 tice2016.exe 228 tice0368.exe 3452 b6518UU.exe 220 c24wR45.exe 4404 metafor.exe 1088 doBrB85.exe 2788 e87Kl84.exe 4876 metafor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features con5072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" con5072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b6518UU.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c24wR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bus6777.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino5452.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino6285.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kino6285.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino7259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kino7259.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice0368.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\foto0128.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000004051\\foto0128.exe" metafor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8e46290218d0378d02763e5c7168baacb70e9b551c9977608e4ecb7756c9868a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kino5452.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce foto0128.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" foto0128.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice2016.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8e46290218d0378d02763e5c7168baacb70e9b551c9977608e4ecb7756c9868a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice2016.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice0368.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 3156 2096 WerFault.exe 94 3336 1212 WerFault.exe 100 2076 1944 WerFault.exe 85 4984 1088 WerFault.exe 133 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4348 bus6777.exe 4348 bus6777.exe 2096 con5072.exe 2096 con5072.exe 1212 dTK81s04.exe 1212 dTK81s04.exe 4876 en982480.exe 4876 en982480.exe 3452 b6518UU.exe 3452 b6518UU.exe 220 c24wR45.exe 220 c24wR45.exe 1088 doBrB85.exe 1088 doBrB85.exe 2788 e87Kl84.exe 2788 e87Kl84.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4348 bus6777.exe Token: SeDebugPrivilege 2096 con5072.exe Token: SeDebugPrivilege 1212 dTK81s04.exe Token: SeDebugPrivilege 4876 en982480.exe Token: SeDebugPrivilege 3452 b6518UU.exe Token: SeDebugPrivilege 220 c24wR45.exe Token: SeDebugPrivilege 1088 doBrB85.exe Token: SeDebugPrivilege 2788 e87Kl84.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1952 1944 8e46290218d0378d02763e5c7168baacb70e9b551c9977608e4ecb7756c9868a.exe 86 PID 1944 wrote to memory of 1952 1944 8e46290218d0378d02763e5c7168baacb70e9b551c9977608e4ecb7756c9868a.exe 86 PID 1944 wrote to memory of 1952 1944 8e46290218d0378d02763e5c7168baacb70e9b551c9977608e4ecb7756c9868a.exe 86 PID 1952 wrote to memory of 1828 1952 kino5452.exe 87 PID 1952 wrote to memory of 1828 1952 kino5452.exe 87 PID 1952 wrote to memory of 1828 1952 kino5452.exe 87 PID 1828 wrote to memory of 2288 1828 kino6285.exe 88 PID 1828 wrote to memory of 2288 1828 kino6285.exe 88 PID 1828 wrote to memory of 2288 1828 kino6285.exe 88 PID 2288 wrote to memory of 4348 2288 kino7259.exe 89 PID 2288 wrote to memory of 4348 2288 kino7259.exe 89 PID 2288 wrote to memory of 2096 2288 kino7259.exe 94 PID 2288 wrote to memory of 2096 2288 kino7259.exe 94 PID 2288 wrote to memory of 2096 2288 kino7259.exe 94 PID 1828 wrote to memory of 1212 1828 kino6285.exe 100 PID 1828 wrote to memory of 1212 1828 kino6285.exe 100 PID 1828 wrote to memory of 1212 1828 kino6285.exe 100 PID 1952 wrote to memory of 4876 1952 kino5452.exe 111 PID 1952 wrote to memory of 4876 1952 kino5452.exe 111 PID 1952 wrote to memory of 4876 1952 kino5452.exe 111 PID 1944 wrote to memory of 1548 1944 8e46290218d0378d02763e5c7168baacb70e9b551c9977608e4ecb7756c9868a.exe 112 PID 1944 wrote to memory of 1548 1944 8e46290218d0378d02763e5c7168baacb70e9b551c9977608e4ecb7756c9868a.exe 112 PID 1944 wrote to memory of 1548 1944 8e46290218d0378d02763e5c7168baacb70e9b551c9977608e4ecb7756c9868a.exe 112 PID 1548 wrote to memory of 4564 1548 ge295591.exe 113 PID 1548 wrote to memory of 4564 1548 ge295591.exe 113 PID 1548 wrote to memory of 4564 1548 ge295591.exe 113 PID 3004 wrote to memory of 3192 3004 cmd.exe 120 PID 3004 wrote to memory of 3192 3004 cmd.exe 120 PID 3004 wrote to memory of 3192 3004 cmd.exe 120 PID 3004 wrote to memory of 5108 3004 cmd.exe 121 PID 3004 wrote to memory of 5108 3004 cmd.exe 121 PID 3004 wrote to memory of 5108 3004 cmd.exe 121 PID 3004 wrote to memory of 3936 3004 cmd.exe 122 PID 3004 wrote to memory of 3936 3004 cmd.exe 122 PID 3004 wrote to memory of 3936 3004 cmd.exe 122 PID 3004 wrote to memory of 4888 3004 cmd.exe 123 PID 3004 wrote to memory of 4888 3004 cmd.exe 123 PID 3004 wrote to memory of 4888 3004 cmd.exe 123 PID 3004 wrote to memory of 3708 3004 cmd.exe 124 PID 3004 wrote to memory of 3708 3004 cmd.exe 124 PID 3004 wrote to memory of 3708 3004 cmd.exe 124 PID 3004 wrote to memory of 2216 3004 cmd.exe 125 PID 3004 wrote to memory of 2216 3004 cmd.exe 125 PID 3004 wrote to memory of 2216 3004 cmd.exe 125 PID 5060 wrote to memory of 748 5060 foto0128.exe 127 PID 5060 wrote to memory of 748 5060 foto0128.exe 127 PID 5060 wrote to memory of 748 5060 foto0128.exe 127 PID 748 wrote to memory of 228 748 tice2016.exe 128 PID 748 wrote to memory of 228 748 tice2016.exe 128 PID 748 wrote to memory of 228 748 tice2016.exe 128 PID 228 wrote to memory of 3452 228 tice0368.exe 129 PID 228 wrote to memory of 3452 228 tice0368.exe 129 PID 228 wrote to memory of 220 228 tice0368.exe 130 PID 228 wrote to memory of 220 228 tice0368.exe 130 PID 228 wrote to memory of 220 228 tice0368.exe 130 PID 748 wrote to memory of 1088 748 tice2016.exe 133 PID 748 wrote to memory of 1088 748 tice2016.exe 133 PID 748 wrote to memory of 1088 748 tice2016.exe 133 PID 5060 wrote to memory of 2788 5060 foto0128.exe 136 PID 5060 wrote to memory of 2788 5060 foto0128.exe 136 PID 5060 wrote to memory of 2788 5060 foto0128.exe 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e46290218d0378d02763e5c7168baacb70e9b551c9977608e4ecb7756c9868a.exe"C:\Users\Admin\AppData\Local\Temp\8e46290218d0378d02763e5c7168baacb70e9b551c9977608e4ecb7756c9868a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino5452.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino5452.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6285.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6285.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7259.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7259.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6777.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6777.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con5072.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con5072.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 10846⤵
- Program crash
PID:3156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dTK81s04.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dTK81s04.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 13285⤵
- Program crash
PID:3336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en982480.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en982480.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge295591.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge295591.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:4564 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F4⤵
- Creates scheduled task(s)
PID:1840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3192
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metafor.exe" /P "Admin:N"5⤵PID:5108
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metafor.exe" /P "Admin:R" /E5⤵PID:3936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4888
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5975271bda" /P "Admin:N"5⤵PID:3708
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5975271bda" /P "Admin:R" /E5⤵PID:2216
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004051\foto0128.exe"C:\Users\Admin\AppData\Local\Temp\1000004051\foto0128.exe"4⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2016.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2016.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0368.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0368.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6518UU.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6518UU.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c24wR45.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c24wR45.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\doBrB85.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\doBrB85.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 13407⤵
- Program crash
PID:4984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e87Kl84.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e87Kl84.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 4322⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2096 -ip 20961⤵PID:1084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1212 -ip 12121⤵PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1944 -ip 19441⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exeC:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe1⤵
- Executes dropped EXE
PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1088 -ip 10881⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exeC:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe1⤵
- Executes dropped EXE
PID:4876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD58627ebe3777cc777ed2a14b907162224
SHA106eeed93eb3094f9d0b13ac4a6936f7088fbbdaa
SHA256319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb
SHA5129de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845
-
Filesize
226KB
MD58627ebe3777cc777ed2a14b907162224
SHA106eeed93eb3094f9d0b13ac4a6936f7088fbbdaa
SHA256319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb
SHA5129de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845
-
Filesize
226KB
MD58627ebe3777cc777ed2a14b907162224
SHA106eeed93eb3094f9d0b13ac4a6936f7088fbbdaa
SHA256319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb
SHA5129de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845
-
Filesize
226KB
MD58627ebe3777cc777ed2a14b907162224
SHA106eeed93eb3094f9d0b13ac4a6936f7088fbbdaa
SHA256319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb
SHA5129de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845
-
Filesize
226KB
MD58627ebe3777cc777ed2a14b907162224
SHA106eeed93eb3094f9d0b13ac4a6936f7088fbbdaa
SHA256319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb
SHA5129de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845
-
Filesize
175KB
MD5759627441452bd502f0d0fba797bcd52
SHA118eea75008b488b74217784ee0c88428af8fc30e
SHA2560898215e951a61929012606a99ecc6f18db7e35aea3b46294be9e0bdc4a634e6
SHA51245b9a4cb1b1f4a1277a905a9a16d3491ec8a5ba87264ab83aebf87158bc3beb50b32093aaf406b44b85f353fd2b2636fbcd34866d99c4e2f5fbb3c2b8e888bdc
-
Filesize
175KB
MD5759627441452bd502f0d0fba797bcd52
SHA118eea75008b488b74217784ee0c88428af8fc30e
SHA2560898215e951a61929012606a99ecc6f18db7e35aea3b46294be9e0bdc4a634e6
SHA51245b9a4cb1b1f4a1277a905a9a16d3491ec8a5ba87264ab83aebf87158bc3beb50b32093aaf406b44b85f353fd2b2636fbcd34866d99c4e2f5fbb3c2b8e888bdc
-
Filesize
175KB
MD5759627441452bd502f0d0fba797bcd52
SHA118eea75008b488b74217784ee0c88428af8fc30e
SHA2560898215e951a61929012606a99ecc6f18db7e35aea3b46294be9e0bdc4a634e6
SHA51245b9a4cb1b1f4a1277a905a9a16d3491ec8a5ba87264ab83aebf87158bc3beb50b32093aaf406b44b85f353fd2b2636fbcd34866d99c4e2f5fbb3c2b8e888bdc
-
Filesize
226KB
MD58627ebe3777cc777ed2a14b907162224
SHA106eeed93eb3094f9d0b13ac4a6936f7088fbbdaa
SHA256319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb
SHA5129de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845
-
Filesize
226KB
MD58627ebe3777cc777ed2a14b907162224
SHA106eeed93eb3094f9d0b13ac4a6936f7088fbbdaa
SHA256319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb
SHA5129de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845
-
Filesize
777KB
MD52c73442107d8668744025e2f5a9d0682
SHA18b71295be24452b6121030873a565880ec22af09
SHA2562b38cffea5d78856aa62dc592a5a503e8d95145f597dc0ae71f4ec42e3f76d20
SHA512e05cfe363f95c9204481b38e43430686c132ed39d19dd32c15a0badec71180efb6c1938be9041c3fe53d2c8f47e34a3eaff5ad8bd881218ce18de001d1c7949e
-
Filesize
777KB
MD52c73442107d8668744025e2f5a9d0682
SHA18b71295be24452b6121030873a565880ec22af09
SHA2562b38cffea5d78856aa62dc592a5a503e8d95145f597dc0ae71f4ec42e3f76d20
SHA512e05cfe363f95c9204481b38e43430686c132ed39d19dd32c15a0badec71180efb6c1938be9041c3fe53d2c8f47e34a3eaff5ad8bd881218ce18de001d1c7949e
-
Filesize
647KB
MD59943d6028fe0782a2b068844d25162bd
SHA14e40ef5c5a9fe6965127d3ec6b2e443f9d8905ac
SHA2562f3494cf6b0f8145608b7e7d61ca699cdf022f06d33f7c32e7eba3957058374d
SHA5124fd562214d96a76199ba347df52de9de0dccdcc6086fc391ca1ea849e40d4a8650998a1129b33a98daf9c7d424b61e972f107ca4a024787b790123174d7bab32
-
Filesize
647KB
MD59943d6028fe0782a2b068844d25162bd
SHA14e40ef5c5a9fe6965127d3ec6b2e443f9d8905ac
SHA2562f3494cf6b0f8145608b7e7d61ca699cdf022f06d33f7c32e7eba3957058374d
SHA5124fd562214d96a76199ba347df52de9de0dccdcc6086fc391ca1ea849e40d4a8650998a1129b33a98daf9c7d424b61e972f107ca4a024787b790123174d7bab32
-
Filesize
284KB
MD5b7b4d7bc2420a0ad411d8542e9e914d4
SHA10dc01b8eabf1926d5b045bd515911d80bbe786b2
SHA25630f741e91622ff369f5d52b659110a91b0cc0c62fa39c5f0d19c5996f4afcba4
SHA5121353dbe7600149c0189d6af6b55fd190c8f5ffe4cd5e015ed6811fa54596c50494f61dbe43d058c4daba307a7887b4b7454df76fa94516e28438163c357d8ae5
-
Filesize
284KB
MD5b7b4d7bc2420a0ad411d8542e9e914d4
SHA10dc01b8eabf1926d5b045bd515911d80bbe786b2
SHA25630f741e91622ff369f5d52b659110a91b0cc0c62fa39c5f0d19c5996f4afcba4
SHA5121353dbe7600149c0189d6af6b55fd190c8f5ffe4cd5e015ed6811fa54596c50494f61dbe43d058c4daba307a7887b4b7454df76fa94516e28438163c357d8ae5
-
Filesize
175KB
MD5759627441452bd502f0d0fba797bcd52
SHA118eea75008b488b74217784ee0c88428af8fc30e
SHA2560898215e951a61929012606a99ecc6f18db7e35aea3b46294be9e0bdc4a634e6
SHA51245b9a4cb1b1f4a1277a905a9a16d3491ec8a5ba87264ab83aebf87158bc3beb50b32093aaf406b44b85f353fd2b2636fbcd34866d99c4e2f5fbb3c2b8e888bdc
-
Filesize
175KB
MD5759627441452bd502f0d0fba797bcd52
SHA118eea75008b488b74217784ee0c88428af8fc30e
SHA2560898215e951a61929012606a99ecc6f18db7e35aea3b46294be9e0bdc4a634e6
SHA51245b9a4cb1b1f4a1277a905a9a16d3491ec8a5ba87264ab83aebf87158bc3beb50b32093aaf406b44b85f353fd2b2636fbcd34866d99c4e2f5fbb3c2b8e888bdc
-
Filesize
635KB
MD51d57a658eaf83647c767b93aaae821bc
SHA1b9f64f0c39cb157b860a12f9a129ccfc61dc6b76
SHA2569fbf399674d25bdd6c11d4160a7a6c7740fdf25d96c93c6e8a362b113abcbd8e
SHA5124ba6843c94e6cf9d18cac4c42a7c58ae2f3703c93dc7d8e11b754726f98cb8573208b47e54444b94352af883f5694433887a1ccb3e637b748d7049a5924c4c8f
-
Filesize
635KB
MD51d57a658eaf83647c767b93aaae821bc
SHA1b9f64f0c39cb157b860a12f9a129ccfc61dc6b76
SHA2569fbf399674d25bdd6c11d4160a7a6c7740fdf25d96c93c6e8a362b113abcbd8e
SHA5124ba6843c94e6cf9d18cac4c42a7c58ae2f3703c93dc7d8e11b754726f98cb8573208b47e54444b94352af883f5694433887a1ccb3e637b748d7049a5924c4c8f
-
Filesize
324KB
MD5cd30d67407e10833b965628964f5f346
SHA133303125c481d3474192855f6722c79ba6c927d1
SHA25630ac978dfb0724f3ea8c7248f50643773664739999d0ff204c5960a92860b95a
SHA512dfdbe6e3e420c374c0832efb1fe6f7afedad5faf6c97fdef198469abfaef3b4d9f82b41e952453527524b3adf68cb9830335ed1966b413a82e54345d60a722bb
-
Filesize
324KB
MD5cd30d67407e10833b965628964f5f346
SHA133303125c481d3474192855f6722c79ba6c927d1
SHA25630ac978dfb0724f3ea8c7248f50643773664739999d0ff204c5960a92860b95a
SHA512dfdbe6e3e420c374c0832efb1fe6f7afedad5faf6c97fdef198469abfaef3b4d9f82b41e952453527524b3adf68cb9830335ed1966b413a82e54345d60a722bb
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD5323ca7c3dfbec3c01452cfba1cddfd70
SHA108502348a5b384e1d5336685b9c437a2a2d164be
SHA25647b90638b352d8f3b2bbc8816eddc11adcff4531b149459d152699ff0d6d2aea
SHA51201073a8b5d7d9f768c701a91916ab2b7e475535ebf5fa2090ebb52195da0a7cd7738e3bea7afb0f4108734a2a49cfbfaea97192f2ccae4363e5caa2e83094016
-
Filesize
226KB
MD5323ca7c3dfbec3c01452cfba1cddfd70
SHA108502348a5b384e1d5336685b9c437a2a2d164be
SHA25647b90638b352d8f3b2bbc8816eddc11adcff4531b149459d152699ff0d6d2aea
SHA51201073a8b5d7d9f768c701a91916ab2b7e475535ebf5fa2090ebb52195da0a7cd7738e3bea7afb0f4108734a2a49cfbfaea97192f2ccae4363e5caa2e83094016
-
Filesize
284KB
MD5afa69421dad8f94f2057ddb1cd19cf92
SHA1b28fe256ba503ccb57408fef512bf983a243bda5
SHA2562d2f8e6ac6347f35fcc758a23abdcd1ed2a74728724f8cc3b74a78c3b6f01478
SHA5127bf320325174f864ec025f2c7f775d52d6b0bf551f614273017eeec947d90a14591e4246be7a072695582a9ff3cc6d1b4d8e7b8cc159d07e0425e79ee4f07568
-
Filesize
284KB
MD5afa69421dad8f94f2057ddb1cd19cf92
SHA1b28fe256ba503ccb57408fef512bf983a243bda5
SHA2562d2f8e6ac6347f35fcc758a23abdcd1ed2a74728724f8cc3b74a78c3b6f01478
SHA5127bf320325174f864ec025f2c7f775d52d6b0bf551f614273017eeec947d90a14591e4246be7a072695582a9ff3cc6d1b4d8e7b8cc159d07e0425e79ee4f07568
-
Filesize
314KB
MD575e559497914e90d1767b1db85abc696
SHA1441d580f43a94bb90f0bc0ab6138bf59e87d57ba
SHA25601e2b46c745620e48f762e1ca257571b6efbb72856dc2d1ee50d42ca56b467f0
SHA512e5dcc261e4a74132695b2345d70a90968ffb3413be2190778815775f85718a3ae80fe5a8fc597dc146234db649b55ed7b615139dac89ac07e89826c59999a983
-
Filesize
314KB
MD575e559497914e90d1767b1db85abc696
SHA1441d580f43a94bb90f0bc0ab6138bf59e87d57ba
SHA25601e2b46c745620e48f762e1ca257571b6efbb72856dc2d1ee50d42ca56b467f0
SHA512e5dcc261e4a74132695b2345d70a90968ffb3413be2190778815775f85718a3ae80fe5a8fc597dc146234db649b55ed7b615139dac89ac07e89826c59999a983
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD5ca2ac6b0859de5f15a3f7ffb62d0e3c2
SHA12e7d63677032a11f3f08a048ab471ccacd08e2a5
SHA256a50abe9dc2fb0bab3fafac891f073205fc38312e68c7dc5f092a08737eb50ea0
SHA5128c5271724b29d3135876c4d8398bf590f9ee4cce38cdb8219e0d70ae5388beb1a7b228c41818e61d69f1d44fae29fbbcda81ab9420c3420dd4fa6e3e606613a6
-
Filesize
226KB
MD5ca2ac6b0859de5f15a3f7ffb62d0e3c2
SHA12e7d63677032a11f3f08a048ab471ccacd08e2a5
SHA256a50abe9dc2fb0bab3fafac891f073205fc38312e68c7dc5f092a08737eb50ea0
SHA5128c5271724b29d3135876c4d8398bf590f9ee4cce38cdb8219e0d70ae5388beb1a7b228c41818e61d69f1d44fae29fbbcda81ab9420c3420dd4fa6e3e606613a6