Analysis
-
max time kernel
131s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2023 17:35
Static task
static1
Behavioral task
behavioral1
Sample
dcd493e400d8d197859bdb652aa99306e78df54164cf602b010b0fd14ea76593.exe
Resource
win10v2004-20230221-en
General
-
Target
dcd493e400d8d197859bdb652aa99306e78df54164cf602b010b0fd14ea76593.exe
-
Size
1.1MB
-
MD5
118314de1cb857bd7de4965bf69c40a3
-
SHA1
0743941d50b1bf385732435c7fc47dc73d8e712d
-
SHA256
dcd493e400d8d197859bdb652aa99306e78df54164cf602b010b0fd14ea76593
-
SHA512
7e580cc6803fa4118b141beff56d79fc02707d04e707d463cb9721c5c4b2f778eaae43d45220e32eee43be94ac471ce521564f9496dfc989f22093d756d231eb
-
SSDEEP
12288:vMrUy902g2B3QM4cSYgGt71JJWz9DfDwu7ptnm5CryhX6ItyuLBC8mGevypyLTM9:DyIP/YBBNLu7Pm5Crs66yWCpvyshNf8
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
litor
77.91.124.145:4125
-
auth_value
d39ced97dbbaa8eab490390c2e2a6a10
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz6453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz6453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz6453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz6453.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v1379vN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v1379vN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v1379vN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz6453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz6453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v1379vN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v1379vN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v1379vN.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation w14lP88.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation y35Ye37.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 13 IoCs
pid Process 4700 zap1373.exe 704 zap7369.exe 2192 zap8360.exe 2504 tz6453.exe 3988 v1379vN.exe 3920 w14lP88.exe 2188 1.exe 1152 xXAJf69.exe 2496 y35Ye37.exe 1360 oneetx.exe 3632 qiv1ow16wzuw.exe 2076 oneetx.exe 4720 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2688 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v1379vN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v1379vN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz6453.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap1373.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap7369.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap7369.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap8360.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap8360.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dcd493e400d8d197859bdb652aa99306e78df54164cf602b010b0fd14ea76593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dcd493e400d8d197859bdb652aa99306e78df54164cf602b010b0fd14ea76593.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap1373.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 55 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3632 set thread context of 1096 3632 qiv1ow16wzuw.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1388 3988 WerFault.exe 89 3812 3920 WerFault.exe 96 4972 3632 WerFault.exe 105 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier vbc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2232 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 224 PING.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2504 tz6453.exe 2504 tz6453.exe 3988 v1379vN.exe 3988 v1379vN.exe 1152 xXAJf69.exe 2188 1.exe 2188 1.exe 1152 xXAJf69.exe 1096 vbc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2504 tz6453.exe Token: SeDebugPrivilege 3988 v1379vN.exe Token: SeDebugPrivilege 3920 w14lP88.exe Token: SeDebugPrivilege 1152 xXAJf69.exe Token: SeDebugPrivilege 2188 1.exe Token: SeDebugPrivilege 1096 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 y35Ye37.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4700 4376 dcd493e400d8d197859bdb652aa99306e78df54164cf602b010b0fd14ea76593.exe 81 PID 4376 wrote to memory of 4700 4376 dcd493e400d8d197859bdb652aa99306e78df54164cf602b010b0fd14ea76593.exe 81 PID 4376 wrote to memory of 4700 4376 dcd493e400d8d197859bdb652aa99306e78df54164cf602b010b0fd14ea76593.exe 81 PID 4700 wrote to memory of 704 4700 zap1373.exe 82 PID 4700 wrote to memory of 704 4700 zap1373.exe 82 PID 4700 wrote to memory of 704 4700 zap1373.exe 82 PID 704 wrote to memory of 2192 704 zap7369.exe 83 PID 704 wrote to memory of 2192 704 zap7369.exe 83 PID 704 wrote to memory of 2192 704 zap7369.exe 83 PID 2192 wrote to memory of 2504 2192 zap8360.exe 84 PID 2192 wrote to memory of 2504 2192 zap8360.exe 84 PID 2192 wrote to memory of 3988 2192 zap8360.exe 89 PID 2192 wrote to memory of 3988 2192 zap8360.exe 89 PID 2192 wrote to memory of 3988 2192 zap8360.exe 89 PID 704 wrote to memory of 3920 704 zap7369.exe 96 PID 704 wrote to memory of 3920 704 zap7369.exe 96 PID 704 wrote to memory of 3920 704 zap7369.exe 96 PID 3920 wrote to memory of 2188 3920 w14lP88.exe 97 PID 3920 wrote to memory of 2188 3920 w14lP88.exe 97 PID 3920 wrote to memory of 2188 3920 w14lP88.exe 97 PID 4700 wrote to memory of 1152 4700 zap1373.exe 100 PID 4700 wrote to memory of 1152 4700 zap1373.exe 100 PID 4700 wrote to memory of 1152 4700 zap1373.exe 100 PID 4376 wrote to memory of 2496 4376 dcd493e400d8d197859bdb652aa99306e78df54164cf602b010b0fd14ea76593.exe 101 PID 4376 wrote to memory of 2496 4376 dcd493e400d8d197859bdb652aa99306e78df54164cf602b010b0fd14ea76593.exe 101 PID 4376 wrote to memory of 2496 4376 dcd493e400d8d197859bdb652aa99306e78df54164cf602b010b0fd14ea76593.exe 101 PID 2496 wrote to memory of 1360 2496 y35Ye37.exe 102 PID 2496 wrote to memory of 1360 2496 y35Ye37.exe 102 PID 2496 wrote to memory of 1360 2496 y35Ye37.exe 102 PID 1360 wrote to memory of 2232 1360 oneetx.exe 103 PID 1360 wrote to memory of 2232 1360 oneetx.exe 103 PID 1360 wrote to memory of 2232 1360 oneetx.exe 103 PID 1360 wrote to memory of 3632 1360 oneetx.exe 105 PID 1360 wrote to memory of 3632 1360 oneetx.exe 105 PID 1360 wrote to memory of 3632 1360 oneetx.exe 105 PID 3632 wrote to memory of 1096 3632 qiv1ow16wzuw.exe 107 PID 3632 wrote to memory of 1096 3632 qiv1ow16wzuw.exe 107 PID 3632 wrote to memory of 1096 3632 qiv1ow16wzuw.exe 107 PID 3632 wrote to memory of 1096 3632 qiv1ow16wzuw.exe 107 PID 3632 wrote to memory of 1096 3632 qiv1ow16wzuw.exe 107 PID 1096 wrote to memory of 2300 1096 vbc.exe 110 PID 1096 wrote to memory of 2300 1096 vbc.exe 110 PID 1096 wrote to memory of 2300 1096 vbc.exe 110 PID 2300 wrote to memory of 320 2300 cmd.exe 112 PID 2300 wrote to memory of 320 2300 cmd.exe 112 PID 2300 wrote to memory of 320 2300 cmd.exe 112 PID 2300 wrote to memory of 1276 2300 cmd.exe 113 PID 2300 wrote to memory of 1276 2300 cmd.exe 113 PID 2300 wrote to memory of 1276 2300 cmd.exe 113 PID 2300 wrote to memory of 1368 2300 cmd.exe 114 PID 2300 wrote to memory of 1368 2300 cmd.exe 114 PID 2300 wrote to memory of 1368 2300 cmd.exe 114 PID 1096 wrote to memory of 1020 1096 vbc.exe 115 PID 1096 wrote to memory of 1020 1096 vbc.exe 115 PID 1096 wrote to memory of 1020 1096 vbc.exe 115 PID 1020 wrote to memory of 1516 1020 cmd.exe 117 PID 1020 wrote to memory of 1516 1020 cmd.exe 117 PID 1020 wrote to memory of 1516 1020 cmd.exe 117 PID 1020 wrote to memory of 4476 1020 cmd.exe 118 PID 1020 wrote to memory of 4476 1020 cmd.exe 118 PID 1020 wrote to memory of 4476 1020 cmd.exe 118 PID 1020 wrote to memory of 1696 1020 cmd.exe 119 PID 1020 wrote to memory of 1696 1020 cmd.exe 119 PID 1020 wrote to memory of 1696 1020 cmd.exe 119 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcd493e400d8d197859bdb652aa99306e78df54164cf602b010b0fd14ea76593.exe"C:\Users\Admin\AppData\Local\Temp\dcd493e400d8d197859bdb652aa99306e78df54164cf602b010b0fd14ea76593.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1373.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1373.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7369.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7369.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap8360.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap8360.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6453.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6453.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1379vN.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1379vN.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 10806⤵
- Program crash
PID:1388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w14lP88.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w14lP88.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 13805⤵
- Program crash
PID:3812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xXAJf69.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xXAJf69.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y35Ye37.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y35Ye37.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\1000021001\qiv1ow16wzuw.exe"C:\Users\Admin\AppData\Local\Temp\1000021001\qiv1ow16wzuw.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1096 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All6⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:320
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile7⤵PID:1276
-
-
C:\Windows\SysWOW64\findstr.exefindstr All7⤵PID:1368
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key6⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:1516
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile name="65001" key=clear7⤵PID:4476
-
-
C:\Windows\SysWOW64\findstr.exefindstr Key7⤵PID:1696
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"6⤵PID:2324
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:4728
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.17⤵
- Runs ping.exe
PID:224
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 1405⤵
- Program crash
PID:4972
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2688
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3988 -ip 39881⤵PID:60
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3920 -ip 39201⤵PID:840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3632 -ip 36321⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:2076
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:4720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
667KB
MD51125d277ccde4c5fea05e9b784107388
SHA133a6701d158fdf233d9551d949fee2b1eefa31f4
SHA256156da573614eadb656348d9ac7af4de07134dd7e1f66cb2df40260a830b7b520
SHA5123c335773a982a6f652b8481a82d70983f4d7a64ea9a699c2fbf370413124770bcd6ee629057aa9478ba37125e88e2d8a68a1a50ade95c27722fcc631b4dee4ea
-
Filesize
667KB
MD51125d277ccde4c5fea05e9b784107388
SHA133a6701d158fdf233d9551d949fee2b1eefa31f4
SHA256156da573614eadb656348d9ac7af4de07134dd7e1f66cb2df40260a830b7b520
SHA5123c335773a982a6f652b8481a82d70983f4d7a64ea9a699c2fbf370413124770bcd6ee629057aa9478ba37125e88e2d8a68a1a50ade95c27722fcc631b4dee4ea
-
Filesize
667KB
MD51125d277ccde4c5fea05e9b784107388
SHA133a6701d158fdf233d9551d949fee2b1eefa31f4
SHA256156da573614eadb656348d9ac7af4de07134dd7e1f66cb2df40260a830b7b520
SHA5123c335773a982a6f652b8481a82d70983f4d7a64ea9a699c2fbf370413124770bcd6ee629057aa9478ba37125e88e2d8a68a1a50ade95c27722fcc631b4dee4ea
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
931KB
MD5d1f51519ac6aa5a9995a0e209d8dafe9
SHA1d79ff847423598d229e69e3c98ce0addbc648e03
SHA2568ebe021bc6823318eb0ae2e1a0a777ac5768eecf8079df795da6f15310c686a9
SHA512f77b13026321a91996c446adc473b7fe40323f5eef0f4aa44a389f1ed869a94512059026975d2b0db38f590f1cc9497943208f6badddee96fd6d14afa1e6d43a
-
Filesize
931KB
MD5d1f51519ac6aa5a9995a0e209d8dafe9
SHA1d79ff847423598d229e69e3c98ce0addbc648e03
SHA2568ebe021bc6823318eb0ae2e1a0a777ac5768eecf8079df795da6f15310c686a9
SHA512f77b13026321a91996c446adc473b7fe40323f5eef0f4aa44a389f1ed869a94512059026975d2b0db38f590f1cc9497943208f6badddee96fd6d14afa1e6d43a
-
Filesize
168KB
MD594158fdb831c345db7d23c8fa826f3da
SHA170bfe24722b6ca173d42eb6c5470e09836709060
SHA2566447e90baa51aaf231c2b664b9aece16ca8567c01c4dad6892662fcd5857ac92
SHA51201a82896ed8bb08e3ae060969ba00dfa104faca83eb11b706529579da7cf490de132217cad67fcda85d161ada72ab055011f2f6210fb4205a4b66bf211272884
-
Filesize
168KB
MD594158fdb831c345db7d23c8fa826f3da
SHA170bfe24722b6ca173d42eb6c5470e09836709060
SHA2566447e90baa51aaf231c2b664b9aece16ca8567c01c4dad6892662fcd5857ac92
SHA51201a82896ed8bb08e3ae060969ba00dfa104faca83eb11b706529579da7cf490de132217cad67fcda85d161ada72ab055011f2f6210fb4205a4b66bf211272884
-
Filesize
777KB
MD55b1cea19d8f0ec80dccbbe23177c090a
SHA1217bf7a84373444d06f600fa41a8fc95e6a93184
SHA256880af4bbdb9041b1b9ad76868a25a89e150f5cb53b909c1f90e2896f9282571c
SHA512bf4ed1855babc80e4d5a78df429f4a803f9d2f2386697f9a7b0217214a4f003673c04ed5323d4e31ce9b27f8fe62e3f244273466a537fb379835d708c183a026
-
Filesize
777KB
MD55b1cea19d8f0ec80dccbbe23177c090a
SHA1217bf7a84373444d06f600fa41a8fc95e6a93184
SHA256880af4bbdb9041b1b9ad76868a25a89e150f5cb53b909c1f90e2896f9282571c
SHA512bf4ed1855babc80e4d5a78df429f4a803f9d2f2386697f9a7b0217214a4f003673c04ed5323d4e31ce9b27f8fe62e3f244273466a537fb379835d708c183a026
-
Filesize
418KB
MD5ec6e986ed383084556cc18b3b31ecd44
SHA174eba0e836017933c7f6a2fe5665d0db15d261ea
SHA256a5a791315fd65bb976ff9515031abe5b6aa30b24164bf864e53537d28f327724
SHA5122f093be0f9aa421d9963ccfde799a36b5080ae01120495e322e0616c99a1322aee4a2bb05b35101faba51e79adc6b4fcd3c87f731d2a3c302504ef87177bee8c
-
Filesize
418KB
MD5ec6e986ed383084556cc18b3b31ecd44
SHA174eba0e836017933c7f6a2fe5665d0db15d261ea
SHA256a5a791315fd65bb976ff9515031abe5b6aa30b24164bf864e53537d28f327724
SHA5122f093be0f9aa421d9963ccfde799a36b5080ae01120495e322e0616c99a1322aee4a2bb05b35101faba51e79adc6b4fcd3c87f731d2a3c302504ef87177bee8c
-
Filesize
322KB
MD5208f1738faf3c13dfb402b60d81e4ef3
SHA1ee20e41541434cb87a7493b7549fea3d1bdcc9ac
SHA25686f98268b89a81a0bdad61e073df168c8f9c8d106f34a82943c8baf06cef3087
SHA51256a76d4bbf766fc129230908399eba4d5ee34ecf6c5d3f1ad65299c5991355b9cfdc138b4c4af2c3c125daed0ca9827009ed1d65cb0db39f358da62626e5726d
-
Filesize
322KB
MD5208f1738faf3c13dfb402b60d81e4ef3
SHA1ee20e41541434cb87a7493b7549fea3d1bdcc9ac
SHA25686f98268b89a81a0bdad61e073df168c8f9c8d106f34a82943c8baf06cef3087
SHA51256a76d4bbf766fc129230908399eba4d5ee34ecf6c5d3f1ad65299c5991355b9cfdc138b4c4af2c3c125daed0ca9827009ed1d65cb0db39f358da62626e5726d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
235KB
MD5fc3ed1aecbaa769b2126bf495776c05a
SHA1806e9df93cb3145873169485a361d681bcea8cea
SHA256cf21551fb31a2d86e9f01bdf3a8d020db26de908d02a6276fb8a917f37da4e7d
SHA51273e577ff57c27ba6a4e6974b4fdd400fc8a89b574b75da2c1bb1ab9170f5bacefa4d5151993402d605de21c66905a06f86228b6c4bbdaae6fd432e7a91aa8240
-
Filesize
235KB
MD5fc3ed1aecbaa769b2126bf495776c05a
SHA1806e9df93cb3145873169485a361d681bcea8cea
SHA256cf21551fb31a2d86e9f01bdf3a8d020db26de908d02a6276fb8a917f37da4e7d
SHA51273e577ff57c27ba6a4e6974b4fdd400fc8a89b574b75da2c1bb1ab9170f5bacefa4d5151993402d605de21c66905a06f86228b6c4bbdaae6fd432e7a91aa8240
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0