Analysis
-
max time kernel
115s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2023 01:13
Static task
static1
Behavioral task
behavioral1
Sample
13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe
Resource
win7-20230220-en
General
-
Target
13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe
-
Size
1.0MB
-
MD5
1d8e948bf0a9c13677ef1f27daeaea98
-
SHA1
5f157517268b9d13d0f27334211a4baa0102204d
-
SHA256
13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac
-
SHA512
f2d2e11fe2a85b023b9d350dafdd9fcee9dfb40022030ba24af712b890b670cbf4572f74a3272bc095e7ea17978fd108e300b0073cb05cf0856a77741c03fc14
-
SSDEEP
24576:JyXOMGY+JH6rv2upI09QZs5I8SIqVru8aH1GTWrDf/iWeBBk:8yXJH6reurQZ8PqVqlVGCrDf/iWeB
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
reiv
193.233.20.33:4125
-
auth_value
5e0113277ad2cf97a9b7e175007f1c55
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Signatures
-
Processes:
bu190635.execor8294.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bu190635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bu190635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bu190635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bu190635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor8294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor8294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor8294.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bu190635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bu190635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor8294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor8294.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/1000-149-0x00000000049B0000-0x00000000049F6000-memory.dmp family_redline behavioral1/memory/1000-150-0x0000000004B40000-0x0000000004B84000-memory.dmp family_redline behavioral1/memory/1000-152-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-154-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-158-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-162-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-166-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-168-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-172-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-174-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-176-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-178-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-182-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-184-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-180-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-170-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-164-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-160-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-156-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-151-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1000-388-0x0000000004790000-0x00000000047D0000-memory.dmp family_redline -
Executes dropped EXE 10 IoCs
Processes:
kina7714.exekina9624.exekina6939.exebu190635.execor8294.exedAQ76s95.exeen909298.exege534884.exemetafor.exemetafor.exepid process 1744 kina7714.exe 580 kina9624.exe 1876 kina6939.exe 1060 bu190635.exe 540 cor8294.exe 1000 dAQ76s95.exe 1300 en909298.exe 1772 ge534884.exe 1256 metafor.exe 1096 metafor.exe -
Loads dropped DLL 19 IoCs
Processes:
13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exekina7714.exekina9624.exekina6939.execor8294.exedAQ76s95.exeen909298.exege534884.exemetafor.exepid process 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe 1744 kina7714.exe 1744 kina7714.exe 580 kina9624.exe 580 kina9624.exe 1876 kina6939.exe 1876 kina6939.exe 1876 kina6939.exe 1876 kina6939.exe 540 cor8294.exe 580 kina9624.exe 580 kina9624.exe 1000 dAQ76s95.exe 1744 kina7714.exe 1300 en909298.exe 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe 1772 ge534884.exe 1772 ge534884.exe 1256 metafor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
bu190635.execor8294.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features bu190635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bu190635.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features cor8294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor8294.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
kina9624.exekina6939.exe13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exekina7714.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina9624.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina9624.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina6939.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina6939.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina7714.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina7714.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
bu190635.execor8294.exedAQ76s95.exeen909298.exepid process 1060 bu190635.exe 1060 bu190635.exe 540 cor8294.exe 540 cor8294.exe 1000 dAQ76s95.exe 1000 dAQ76s95.exe 1300 en909298.exe 1300 en909298.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
bu190635.execor8294.exedAQ76s95.exeen909298.exedescription pid process Token: SeDebugPrivilege 1060 bu190635.exe Token: SeDebugPrivilege 540 cor8294.exe Token: SeDebugPrivilege 1000 dAQ76s95.exe Token: SeDebugPrivilege 1300 en909298.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exekina7714.exekina9624.exekina6939.exege534884.exemetafor.exedescription pid process target process PID 1988 wrote to memory of 1744 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe kina7714.exe PID 1988 wrote to memory of 1744 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe kina7714.exe PID 1988 wrote to memory of 1744 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe kina7714.exe PID 1988 wrote to memory of 1744 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe kina7714.exe PID 1988 wrote to memory of 1744 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe kina7714.exe PID 1988 wrote to memory of 1744 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe kina7714.exe PID 1988 wrote to memory of 1744 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe kina7714.exe PID 1744 wrote to memory of 580 1744 kina7714.exe kina9624.exe PID 1744 wrote to memory of 580 1744 kina7714.exe kina9624.exe PID 1744 wrote to memory of 580 1744 kina7714.exe kina9624.exe PID 1744 wrote to memory of 580 1744 kina7714.exe kina9624.exe PID 1744 wrote to memory of 580 1744 kina7714.exe kina9624.exe PID 1744 wrote to memory of 580 1744 kina7714.exe kina9624.exe PID 1744 wrote to memory of 580 1744 kina7714.exe kina9624.exe PID 580 wrote to memory of 1876 580 kina9624.exe kina6939.exe PID 580 wrote to memory of 1876 580 kina9624.exe kina6939.exe PID 580 wrote to memory of 1876 580 kina9624.exe kina6939.exe PID 580 wrote to memory of 1876 580 kina9624.exe kina6939.exe PID 580 wrote to memory of 1876 580 kina9624.exe kina6939.exe PID 580 wrote to memory of 1876 580 kina9624.exe kina6939.exe PID 580 wrote to memory of 1876 580 kina9624.exe kina6939.exe PID 1876 wrote to memory of 1060 1876 kina6939.exe bu190635.exe PID 1876 wrote to memory of 1060 1876 kina6939.exe bu190635.exe PID 1876 wrote to memory of 1060 1876 kina6939.exe bu190635.exe PID 1876 wrote to memory of 1060 1876 kina6939.exe bu190635.exe PID 1876 wrote to memory of 1060 1876 kina6939.exe bu190635.exe PID 1876 wrote to memory of 1060 1876 kina6939.exe bu190635.exe PID 1876 wrote to memory of 1060 1876 kina6939.exe bu190635.exe PID 1876 wrote to memory of 540 1876 kina6939.exe cor8294.exe PID 1876 wrote to memory of 540 1876 kina6939.exe cor8294.exe PID 1876 wrote to memory of 540 1876 kina6939.exe cor8294.exe PID 1876 wrote to memory of 540 1876 kina6939.exe cor8294.exe PID 1876 wrote to memory of 540 1876 kina6939.exe cor8294.exe PID 1876 wrote to memory of 540 1876 kina6939.exe cor8294.exe PID 1876 wrote to memory of 540 1876 kina6939.exe cor8294.exe PID 580 wrote to memory of 1000 580 kina9624.exe dAQ76s95.exe PID 580 wrote to memory of 1000 580 kina9624.exe dAQ76s95.exe PID 580 wrote to memory of 1000 580 kina9624.exe dAQ76s95.exe PID 580 wrote to memory of 1000 580 kina9624.exe dAQ76s95.exe PID 580 wrote to memory of 1000 580 kina9624.exe dAQ76s95.exe PID 580 wrote to memory of 1000 580 kina9624.exe dAQ76s95.exe PID 580 wrote to memory of 1000 580 kina9624.exe dAQ76s95.exe PID 1744 wrote to memory of 1300 1744 kina7714.exe en909298.exe PID 1744 wrote to memory of 1300 1744 kina7714.exe en909298.exe PID 1744 wrote to memory of 1300 1744 kina7714.exe en909298.exe PID 1744 wrote to memory of 1300 1744 kina7714.exe en909298.exe PID 1744 wrote to memory of 1300 1744 kina7714.exe en909298.exe PID 1744 wrote to memory of 1300 1744 kina7714.exe en909298.exe PID 1744 wrote to memory of 1300 1744 kina7714.exe en909298.exe PID 1988 wrote to memory of 1772 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe ge534884.exe PID 1988 wrote to memory of 1772 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe ge534884.exe PID 1988 wrote to memory of 1772 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe ge534884.exe PID 1988 wrote to memory of 1772 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe ge534884.exe PID 1988 wrote to memory of 1772 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe ge534884.exe PID 1988 wrote to memory of 1772 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe ge534884.exe PID 1988 wrote to memory of 1772 1988 13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe ge534884.exe PID 1772 wrote to memory of 1256 1772 ge534884.exe metafor.exe PID 1772 wrote to memory of 1256 1772 ge534884.exe metafor.exe PID 1772 wrote to memory of 1256 1772 ge534884.exe metafor.exe PID 1772 wrote to memory of 1256 1772 ge534884.exe metafor.exe PID 1772 wrote to memory of 1256 1772 ge534884.exe metafor.exe PID 1772 wrote to memory of 1256 1772 ge534884.exe metafor.exe PID 1772 wrote to memory of 1256 1772 ge534884.exe metafor.exe PID 1256 wrote to memory of 1168 1256 metafor.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe"C:\Users\Admin\AppData\Local\Temp\13b5ef24472eb8dcdb12adb23ea8cbd08285ac279fd1246aceb4b8adfcaa30ac.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7714.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7714.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina9624.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina9624.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6939.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6939.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu190635.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu190635.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8294.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8294.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dAQ76s95.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dAQ76s95.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en909298.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en909298.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge534884.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge534884.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F4⤵
- Creates scheduled task(s)
PID:1168
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit4⤵PID:1200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metafor.exe" /P "Admin:N"5⤵PID:1404
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "metafor.exe" /P "Admin:R" /E5⤵PID:1944
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5975271bda" /P "Admin:N"5⤵PID:2024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5975271bda" /P "Admin:R" /E5⤵PID:1984
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {67CA55C1-BD1D-403E-B528-D17E65B5D601} S-1-5-21-1283023626-844874658-3193756055-1000:THEQWNRW\Admin:Interactive:[1]1⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exeC:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe2⤵
- Executes dropped EXE
PID:1096
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5a405cafba09d6267cc4d79e45afa5895
SHA168804b03ce32bf7dffedfce99528c0d37e95be9c
SHA256d2b1a7862ef7434a68f73adbd663ae5552b4d00f652a4ef2d5f09ad384261ebb
SHA512c3627c93eef34f5a62c20f02d72c8e2bd566adefb5a9d520c35e6d712f536baf91323489db21566e5827a7a4df58b96e3536c910245f4e6f1e396e47127d58df
-
Filesize
227KB
MD5a405cafba09d6267cc4d79e45afa5895
SHA168804b03ce32bf7dffedfce99528c0d37e95be9c
SHA256d2b1a7862ef7434a68f73adbd663ae5552b4d00f652a4ef2d5f09ad384261ebb
SHA512c3627c93eef34f5a62c20f02d72c8e2bd566adefb5a9d520c35e6d712f536baf91323489db21566e5827a7a4df58b96e3536c910245f4e6f1e396e47127d58df
-
Filesize
227KB
MD5a405cafba09d6267cc4d79e45afa5895
SHA168804b03ce32bf7dffedfce99528c0d37e95be9c
SHA256d2b1a7862ef7434a68f73adbd663ae5552b4d00f652a4ef2d5f09ad384261ebb
SHA512c3627c93eef34f5a62c20f02d72c8e2bd566adefb5a9d520c35e6d712f536baf91323489db21566e5827a7a4df58b96e3536c910245f4e6f1e396e47127d58df
-
Filesize
227KB
MD5a405cafba09d6267cc4d79e45afa5895
SHA168804b03ce32bf7dffedfce99528c0d37e95be9c
SHA256d2b1a7862ef7434a68f73adbd663ae5552b4d00f652a4ef2d5f09ad384261ebb
SHA512c3627c93eef34f5a62c20f02d72c8e2bd566adefb5a9d520c35e6d712f536baf91323489db21566e5827a7a4df58b96e3536c910245f4e6f1e396e47127d58df
-
Filesize
227KB
MD5a405cafba09d6267cc4d79e45afa5895
SHA168804b03ce32bf7dffedfce99528c0d37e95be9c
SHA256d2b1a7862ef7434a68f73adbd663ae5552b4d00f652a4ef2d5f09ad384261ebb
SHA512c3627c93eef34f5a62c20f02d72c8e2bd566adefb5a9d520c35e6d712f536baf91323489db21566e5827a7a4df58b96e3536c910245f4e6f1e396e47127d58df
-
Filesize
227KB
MD5a405cafba09d6267cc4d79e45afa5895
SHA168804b03ce32bf7dffedfce99528c0d37e95be9c
SHA256d2b1a7862ef7434a68f73adbd663ae5552b4d00f652a4ef2d5f09ad384261ebb
SHA512c3627c93eef34f5a62c20f02d72c8e2bd566adefb5a9d520c35e6d712f536baf91323489db21566e5827a7a4df58b96e3536c910245f4e6f1e396e47127d58df
-
Filesize
852KB
MD59e20169b6b9f46d570bc99e3a956568c
SHA13dcc05f4ba8f8b652628285e922df9c962369b10
SHA256dfb432da10bdc74a73222f5f256881016b9915aa52b9eeaeb7ea15406a637bfb
SHA512514bd7f1512c443a70d533b43509ccbcf63a6c641086f8748eca7b4a47ed629600afdcfe9e0b693cdd68eca87e19168f58b744e25fe89870b0b8f0ad254c41ef
-
Filesize
852KB
MD59e20169b6b9f46d570bc99e3a956568c
SHA13dcc05f4ba8f8b652628285e922df9c962369b10
SHA256dfb432da10bdc74a73222f5f256881016b9915aa52b9eeaeb7ea15406a637bfb
SHA512514bd7f1512c443a70d533b43509ccbcf63a6c641086f8748eca7b4a47ed629600afdcfe9e0b693cdd68eca87e19168f58b744e25fe89870b0b8f0ad254c41ef
-
Filesize
175KB
MD5300810248182509542b580e6c1f531c4
SHA145e44830f55258ffb52aee29a106ad2949edcb15
SHA2565ebfca7d7c43bd2f95bdab8384aa97770d88c9635d86d87fded1fcd5695dc423
SHA512320919ae5986fd45a7c4c9b3bbb7da2eac1f188657fde92705492fc58ec79a790486943374bdd2087394f43e92c7b7dfd104407917cf9bb4d9aec5d39978e43e
-
Filesize
175KB
MD5300810248182509542b580e6c1f531c4
SHA145e44830f55258ffb52aee29a106ad2949edcb15
SHA2565ebfca7d7c43bd2f95bdab8384aa97770d88c9635d86d87fded1fcd5695dc423
SHA512320919ae5986fd45a7c4c9b3bbb7da2eac1f188657fde92705492fc58ec79a790486943374bdd2087394f43e92c7b7dfd104407917cf9bb4d9aec5d39978e43e
-
Filesize
709KB
MD55407a8e01c565ae5f93d53d84ad2c389
SHA1b35429ba926983053a2111f5bbe5df14fb2938f9
SHA2566d82c50cce4a06cda2902107954c853737cb65a3508fcc31ee286b4d56dc74bf
SHA512c734f2c9ac306176833cf62bd21a4817e87190a6f018957aba9aef4b3eb0e97d87609670b936d0b09d32e711317ac969447720821af0bce40e62cf372da155d2
-
Filesize
709KB
MD55407a8e01c565ae5f93d53d84ad2c389
SHA1b35429ba926983053a2111f5bbe5df14fb2938f9
SHA2566d82c50cce4a06cda2902107954c853737cb65a3508fcc31ee286b4d56dc74bf
SHA512c734f2c9ac306176833cf62bd21a4817e87190a6f018957aba9aef4b3eb0e97d87609670b936d0b09d32e711317ac969447720821af0bce40e62cf372da155d2
-
Filesize
384KB
MD51d979a6ed2f8a11a33a2daaf7e8a02cd
SHA1cbafa4caf63e06a425392541ca8e8d08c4762d64
SHA25626f40e9ab2e02de708bab81aa4e6647826b7444dad2f1c63b9022b9cdd616036
SHA512479b3bcbadc06178cb364efb9950434f883913c736b8c1e4d849b4e22da9ac28800263f4a679d762ec9360b40a5f7ff9435b30fad0a4e151157610bfef30d7f5
-
Filesize
384KB
MD51d979a6ed2f8a11a33a2daaf7e8a02cd
SHA1cbafa4caf63e06a425392541ca8e8d08c4762d64
SHA25626f40e9ab2e02de708bab81aa4e6647826b7444dad2f1c63b9022b9cdd616036
SHA512479b3bcbadc06178cb364efb9950434f883913c736b8c1e4d849b4e22da9ac28800263f4a679d762ec9360b40a5f7ff9435b30fad0a4e151157610bfef30d7f5
-
Filesize
384KB
MD51d979a6ed2f8a11a33a2daaf7e8a02cd
SHA1cbafa4caf63e06a425392541ca8e8d08c4762d64
SHA25626f40e9ab2e02de708bab81aa4e6647826b7444dad2f1c63b9022b9cdd616036
SHA512479b3bcbadc06178cb364efb9950434f883913c736b8c1e4d849b4e22da9ac28800263f4a679d762ec9360b40a5f7ff9435b30fad0a4e151157610bfef30d7f5
-
Filesize
352KB
MD555518a25b5c2ba7a44a962147d2918c6
SHA108a67cc65f302e6d5445de96c52cbad01237e4cb
SHA256eecfcff643841ea6c41dbbd1d58efedf0121841b3b73b006790fbfdbf4856a9b
SHA5129bd76962b036521beabf797b3d059656080ca6d23015223b3c0db6719010674c5cd21bc54743607b814697ba340efc1c3973ea45de3dcd47f102c424ee547665
-
Filesize
352KB
MD555518a25b5c2ba7a44a962147d2918c6
SHA108a67cc65f302e6d5445de96c52cbad01237e4cb
SHA256eecfcff643841ea6c41dbbd1d58efedf0121841b3b73b006790fbfdbf4856a9b
SHA5129bd76962b036521beabf797b3d059656080ca6d23015223b3c0db6719010674c5cd21bc54743607b814697ba340efc1c3973ea45de3dcd47f102c424ee547665
-
Filesize
12KB
MD52152cd35ef7f3b2d8691b5c6f874739a
SHA10c0e052d82034a0c0503dbc70635d0c94ceba392
SHA2568e9017f8d60cdeeb07aa235b52aed45c41b893265b57fc789369f35b4cb3b6e9
SHA5127632f03b695c596c01b1fbdf1a59ae4206962174ef48b3a60bebdabf2e92304a6d1db2351a8e865609adca4be89806de7aa0ae58aa9439297330793b517bed6d
-
Filesize
12KB
MD52152cd35ef7f3b2d8691b5c6f874739a
SHA10c0e052d82034a0c0503dbc70635d0c94ceba392
SHA2568e9017f8d60cdeeb07aa235b52aed45c41b893265b57fc789369f35b4cb3b6e9
SHA5127632f03b695c596c01b1fbdf1a59ae4206962174ef48b3a60bebdabf2e92304a6d1db2351a8e865609adca4be89806de7aa0ae58aa9439297330793b517bed6d
-
Filesize
325KB
MD58727c08a4203484849e661e197587e86
SHA1ac5556d19d7ed376215f54d0853e16a3b591c2c1
SHA256ad97d1b2e9f524a2134cef2c9f8cfbfbd66b1d0ed25a0a5c04bbd52c812d72e2
SHA5129e400e9c1e7653a8989f7d51df155ed0fc392ca6150b4b2b52d5d0f89934cbcdf864f93661d5006174f954d2813fd52954bb0c0daf109e0841401faac60b6d06
-
Filesize
325KB
MD58727c08a4203484849e661e197587e86
SHA1ac5556d19d7ed376215f54d0853e16a3b591c2c1
SHA256ad97d1b2e9f524a2134cef2c9f8cfbfbd66b1d0ed25a0a5c04bbd52c812d72e2
SHA5129e400e9c1e7653a8989f7d51df155ed0fc392ca6150b4b2b52d5d0f89934cbcdf864f93661d5006174f954d2813fd52954bb0c0daf109e0841401faac60b6d06
-
Filesize
325KB
MD58727c08a4203484849e661e197587e86
SHA1ac5556d19d7ed376215f54d0853e16a3b591c2c1
SHA256ad97d1b2e9f524a2134cef2c9f8cfbfbd66b1d0ed25a0a5c04bbd52c812d72e2
SHA5129e400e9c1e7653a8989f7d51df155ed0fc392ca6150b4b2b52d5d0f89934cbcdf864f93661d5006174f954d2813fd52954bb0c0daf109e0841401faac60b6d06
-
Filesize
227KB
MD5a405cafba09d6267cc4d79e45afa5895
SHA168804b03ce32bf7dffedfce99528c0d37e95be9c
SHA256d2b1a7862ef7434a68f73adbd663ae5552b4d00f652a4ef2d5f09ad384261ebb
SHA512c3627c93eef34f5a62c20f02d72c8e2bd566adefb5a9d520c35e6d712f536baf91323489db21566e5827a7a4df58b96e3536c910245f4e6f1e396e47127d58df
-
Filesize
227KB
MD5a405cafba09d6267cc4d79e45afa5895
SHA168804b03ce32bf7dffedfce99528c0d37e95be9c
SHA256d2b1a7862ef7434a68f73adbd663ae5552b4d00f652a4ef2d5f09ad384261ebb
SHA512c3627c93eef34f5a62c20f02d72c8e2bd566adefb5a9d520c35e6d712f536baf91323489db21566e5827a7a4df58b96e3536c910245f4e6f1e396e47127d58df
-
Filesize
227KB
MD5a405cafba09d6267cc4d79e45afa5895
SHA168804b03ce32bf7dffedfce99528c0d37e95be9c
SHA256d2b1a7862ef7434a68f73adbd663ae5552b4d00f652a4ef2d5f09ad384261ebb
SHA512c3627c93eef34f5a62c20f02d72c8e2bd566adefb5a9d520c35e6d712f536baf91323489db21566e5827a7a4df58b96e3536c910245f4e6f1e396e47127d58df
-
Filesize
227KB
MD5a405cafba09d6267cc4d79e45afa5895
SHA168804b03ce32bf7dffedfce99528c0d37e95be9c
SHA256d2b1a7862ef7434a68f73adbd663ae5552b4d00f652a4ef2d5f09ad384261ebb
SHA512c3627c93eef34f5a62c20f02d72c8e2bd566adefb5a9d520c35e6d712f536baf91323489db21566e5827a7a4df58b96e3536c910245f4e6f1e396e47127d58df
-
Filesize
852KB
MD59e20169b6b9f46d570bc99e3a956568c
SHA13dcc05f4ba8f8b652628285e922df9c962369b10
SHA256dfb432da10bdc74a73222f5f256881016b9915aa52b9eeaeb7ea15406a637bfb
SHA512514bd7f1512c443a70d533b43509ccbcf63a6c641086f8748eca7b4a47ed629600afdcfe9e0b693cdd68eca87e19168f58b744e25fe89870b0b8f0ad254c41ef
-
Filesize
852KB
MD59e20169b6b9f46d570bc99e3a956568c
SHA13dcc05f4ba8f8b652628285e922df9c962369b10
SHA256dfb432da10bdc74a73222f5f256881016b9915aa52b9eeaeb7ea15406a637bfb
SHA512514bd7f1512c443a70d533b43509ccbcf63a6c641086f8748eca7b4a47ed629600afdcfe9e0b693cdd68eca87e19168f58b744e25fe89870b0b8f0ad254c41ef
-
Filesize
175KB
MD5300810248182509542b580e6c1f531c4
SHA145e44830f55258ffb52aee29a106ad2949edcb15
SHA2565ebfca7d7c43bd2f95bdab8384aa97770d88c9635d86d87fded1fcd5695dc423
SHA512320919ae5986fd45a7c4c9b3bbb7da2eac1f188657fde92705492fc58ec79a790486943374bdd2087394f43e92c7b7dfd104407917cf9bb4d9aec5d39978e43e
-
Filesize
175KB
MD5300810248182509542b580e6c1f531c4
SHA145e44830f55258ffb52aee29a106ad2949edcb15
SHA2565ebfca7d7c43bd2f95bdab8384aa97770d88c9635d86d87fded1fcd5695dc423
SHA512320919ae5986fd45a7c4c9b3bbb7da2eac1f188657fde92705492fc58ec79a790486943374bdd2087394f43e92c7b7dfd104407917cf9bb4d9aec5d39978e43e
-
Filesize
709KB
MD55407a8e01c565ae5f93d53d84ad2c389
SHA1b35429ba926983053a2111f5bbe5df14fb2938f9
SHA2566d82c50cce4a06cda2902107954c853737cb65a3508fcc31ee286b4d56dc74bf
SHA512c734f2c9ac306176833cf62bd21a4817e87190a6f018957aba9aef4b3eb0e97d87609670b936d0b09d32e711317ac969447720821af0bce40e62cf372da155d2
-
Filesize
709KB
MD55407a8e01c565ae5f93d53d84ad2c389
SHA1b35429ba926983053a2111f5bbe5df14fb2938f9
SHA2566d82c50cce4a06cda2902107954c853737cb65a3508fcc31ee286b4d56dc74bf
SHA512c734f2c9ac306176833cf62bd21a4817e87190a6f018957aba9aef4b3eb0e97d87609670b936d0b09d32e711317ac969447720821af0bce40e62cf372da155d2
-
Filesize
384KB
MD51d979a6ed2f8a11a33a2daaf7e8a02cd
SHA1cbafa4caf63e06a425392541ca8e8d08c4762d64
SHA25626f40e9ab2e02de708bab81aa4e6647826b7444dad2f1c63b9022b9cdd616036
SHA512479b3bcbadc06178cb364efb9950434f883913c736b8c1e4d849b4e22da9ac28800263f4a679d762ec9360b40a5f7ff9435b30fad0a4e151157610bfef30d7f5
-
Filesize
384KB
MD51d979a6ed2f8a11a33a2daaf7e8a02cd
SHA1cbafa4caf63e06a425392541ca8e8d08c4762d64
SHA25626f40e9ab2e02de708bab81aa4e6647826b7444dad2f1c63b9022b9cdd616036
SHA512479b3bcbadc06178cb364efb9950434f883913c736b8c1e4d849b4e22da9ac28800263f4a679d762ec9360b40a5f7ff9435b30fad0a4e151157610bfef30d7f5
-
Filesize
384KB
MD51d979a6ed2f8a11a33a2daaf7e8a02cd
SHA1cbafa4caf63e06a425392541ca8e8d08c4762d64
SHA25626f40e9ab2e02de708bab81aa4e6647826b7444dad2f1c63b9022b9cdd616036
SHA512479b3bcbadc06178cb364efb9950434f883913c736b8c1e4d849b4e22da9ac28800263f4a679d762ec9360b40a5f7ff9435b30fad0a4e151157610bfef30d7f5
-
Filesize
352KB
MD555518a25b5c2ba7a44a962147d2918c6
SHA108a67cc65f302e6d5445de96c52cbad01237e4cb
SHA256eecfcff643841ea6c41dbbd1d58efedf0121841b3b73b006790fbfdbf4856a9b
SHA5129bd76962b036521beabf797b3d059656080ca6d23015223b3c0db6719010674c5cd21bc54743607b814697ba340efc1c3973ea45de3dcd47f102c424ee547665
-
Filesize
352KB
MD555518a25b5c2ba7a44a962147d2918c6
SHA108a67cc65f302e6d5445de96c52cbad01237e4cb
SHA256eecfcff643841ea6c41dbbd1d58efedf0121841b3b73b006790fbfdbf4856a9b
SHA5129bd76962b036521beabf797b3d059656080ca6d23015223b3c0db6719010674c5cd21bc54743607b814697ba340efc1c3973ea45de3dcd47f102c424ee547665
-
Filesize
12KB
MD52152cd35ef7f3b2d8691b5c6f874739a
SHA10c0e052d82034a0c0503dbc70635d0c94ceba392
SHA2568e9017f8d60cdeeb07aa235b52aed45c41b893265b57fc789369f35b4cb3b6e9
SHA5127632f03b695c596c01b1fbdf1a59ae4206962174ef48b3a60bebdabf2e92304a6d1db2351a8e865609adca4be89806de7aa0ae58aa9439297330793b517bed6d
-
Filesize
325KB
MD58727c08a4203484849e661e197587e86
SHA1ac5556d19d7ed376215f54d0853e16a3b591c2c1
SHA256ad97d1b2e9f524a2134cef2c9f8cfbfbd66b1d0ed25a0a5c04bbd52c812d72e2
SHA5129e400e9c1e7653a8989f7d51df155ed0fc392ca6150b4b2b52d5d0f89934cbcdf864f93661d5006174f954d2813fd52954bb0c0daf109e0841401faac60b6d06
-
Filesize
325KB
MD58727c08a4203484849e661e197587e86
SHA1ac5556d19d7ed376215f54d0853e16a3b591c2c1
SHA256ad97d1b2e9f524a2134cef2c9f8cfbfbd66b1d0ed25a0a5c04bbd52c812d72e2
SHA5129e400e9c1e7653a8989f7d51df155ed0fc392ca6150b4b2b52d5d0f89934cbcdf864f93661d5006174f954d2813fd52954bb0c0daf109e0841401faac60b6d06
-
Filesize
325KB
MD58727c08a4203484849e661e197587e86
SHA1ac5556d19d7ed376215f54d0853e16a3b591c2c1
SHA256ad97d1b2e9f524a2134cef2c9f8cfbfbd66b1d0ed25a0a5c04bbd52c812d72e2
SHA5129e400e9c1e7653a8989f7d51df155ed0fc392ca6150b4b2b52d5d0f89934cbcdf864f93661d5006174f954d2813fd52954bb0c0daf109e0841401faac60b6d06