Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2023 17:43
Static task
static1
Behavioral task
behavioral1
Sample
3cda96254eb907caf650daa35dd72b25764d8efe6391c0bc4e6b572fadc08dc9.exe
Resource
win10v2004-20230220-en
General
-
Target
3cda96254eb907caf650daa35dd72b25764d8efe6391c0bc4e6b572fadc08dc9.exe
-
Size
1.1MB
-
MD5
e358f4a688af4dc7fc935e25369b176c
-
SHA1
e50ebd22fea13c89bcee69a1b97dea740cc9358d
-
SHA256
3cda96254eb907caf650daa35dd72b25764d8efe6391c0bc4e6b572fadc08dc9
-
SHA512
d7131bef043958322834831cdf682efc1b0945eb4b302438cc03ac5b8873a38bdfe39de26636ad02dfd369cd53867a22aab9279cff356b823a763e0aafd2525e
-
SSDEEP
24576:RystvMpd7uelVoUJu3WrtsvWqW1uIh5o/tV1M:Ec6Ju3WrtyW/FC
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
litor
77.91.124.145:4125
-
auth_value
d39ced97dbbaa8eab490390c2e2a6a10
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
Extracted
redline
0409Lucky-bot
135.181.101.75:33666
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz5736.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v3660PB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v3660PB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v3660PB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v3660PB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz5736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz5736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz5736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz5736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v3660PB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v3660PB.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz5736.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2052-2411-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/2052-2411-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation y64BE70.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation ok2.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation w42Yi50.exe -
Executes dropped EXE 15 IoCs
pid Process 2016 zap2616.exe 780 zap9000.exe 1472 zap5235.exe 1912 tz5736.exe 4652 v3660PB.exe 2784 w42Yi50.exe 3728 1.exe 1528 xwHMg41.exe 1356 y64BE70.exe 3108 oneetx.exe 2020 qiv1ow16wzuw.exe 1688 ok2.exe 2052 ok2.exe 4060 oneetx.exe 3484 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2132 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v3660PB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz5736.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v3660PB.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap2616.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap9000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap9000.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap5235.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap5235.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3cda96254eb907caf650daa35dd72b25764d8efe6391c0bc4e6b572fadc08dc9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3cda96254eb907caf650daa35dd72b25764d8efe6391c0bc4e6b572fadc08dc9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap2616.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2020 set thread context of 2624 2020 qiv1ow16wzuw.exe 112 PID 1688 set thread context of 2052 1688 ok2.exe 128 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 5040 4652 WerFault.exe 94 1816 2784 WerFault.exe 100 2660 2020 WerFault.exe 110 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier vbc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4240 schtasks.exe 4740 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3968 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1912 tz5736.exe 1912 tz5736.exe 4652 v3660PB.exe 4652 v3660PB.exe 3728 1.exe 1528 xwHMg41.exe 3728 1.exe 1528 xwHMg41.exe 2624 vbc.exe 1688 ok2.exe 2052 ok2.exe 2052 ok2.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1912 tz5736.exe Token: SeDebugPrivilege 4652 v3660PB.exe Token: SeDebugPrivilege 2784 w42Yi50.exe Token: SeDebugPrivilege 3728 1.exe Token: SeDebugPrivilege 1528 xwHMg41.exe Token: SeDebugPrivilege 2624 vbc.exe Token: SeDebugPrivilege 1688 ok2.exe Token: SeDebugPrivilege 2052 ok2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1356 y64BE70.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3804 wrote to memory of 2016 3804 3cda96254eb907caf650daa35dd72b25764d8efe6391c0bc4e6b572fadc08dc9.exe 86 PID 3804 wrote to memory of 2016 3804 3cda96254eb907caf650daa35dd72b25764d8efe6391c0bc4e6b572fadc08dc9.exe 86 PID 3804 wrote to memory of 2016 3804 3cda96254eb907caf650daa35dd72b25764d8efe6391c0bc4e6b572fadc08dc9.exe 86 PID 2016 wrote to memory of 780 2016 zap2616.exe 87 PID 2016 wrote to memory of 780 2016 zap2616.exe 87 PID 2016 wrote to memory of 780 2016 zap2616.exe 87 PID 780 wrote to memory of 1472 780 zap9000.exe 88 PID 780 wrote to memory of 1472 780 zap9000.exe 88 PID 780 wrote to memory of 1472 780 zap9000.exe 88 PID 1472 wrote to memory of 1912 1472 zap5235.exe 89 PID 1472 wrote to memory of 1912 1472 zap5235.exe 89 PID 1472 wrote to memory of 4652 1472 zap5235.exe 94 PID 1472 wrote to memory of 4652 1472 zap5235.exe 94 PID 1472 wrote to memory of 4652 1472 zap5235.exe 94 PID 780 wrote to memory of 2784 780 zap9000.exe 100 PID 780 wrote to memory of 2784 780 zap9000.exe 100 PID 780 wrote to memory of 2784 780 zap9000.exe 100 PID 2784 wrote to memory of 3728 2784 w42Yi50.exe 102 PID 2784 wrote to memory of 3728 2784 w42Yi50.exe 102 PID 2784 wrote to memory of 3728 2784 w42Yi50.exe 102 PID 2016 wrote to memory of 1528 2016 zap2616.exe 105 PID 2016 wrote to memory of 1528 2016 zap2616.exe 105 PID 2016 wrote to memory of 1528 2016 zap2616.exe 105 PID 3804 wrote to memory of 1356 3804 3cda96254eb907caf650daa35dd72b25764d8efe6391c0bc4e6b572fadc08dc9.exe 106 PID 3804 wrote to memory of 1356 3804 3cda96254eb907caf650daa35dd72b25764d8efe6391c0bc4e6b572fadc08dc9.exe 106 PID 3804 wrote to memory of 1356 3804 3cda96254eb907caf650daa35dd72b25764d8efe6391c0bc4e6b572fadc08dc9.exe 106 PID 1356 wrote to memory of 3108 1356 y64BE70.exe 107 PID 1356 wrote to memory of 3108 1356 y64BE70.exe 107 PID 1356 wrote to memory of 3108 1356 y64BE70.exe 107 PID 3108 wrote to memory of 4240 3108 oneetx.exe 108 PID 3108 wrote to memory of 4240 3108 oneetx.exe 108 PID 3108 wrote to memory of 4240 3108 oneetx.exe 108 PID 3108 wrote to memory of 2020 3108 oneetx.exe 110 PID 3108 wrote to memory of 2020 3108 oneetx.exe 110 PID 3108 wrote to memory of 2020 3108 oneetx.exe 110 PID 2020 wrote to memory of 2624 2020 qiv1ow16wzuw.exe 112 PID 2020 wrote to memory of 2624 2020 qiv1ow16wzuw.exe 112 PID 2020 wrote to memory of 2624 2020 qiv1ow16wzuw.exe 112 PID 2020 wrote to memory of 2624 2020 qiv1ow16wzuw.exe 112 PID 2020 wrote to memory of 2624 2020 qiv1ow16wzuw.exe 112 PID 3108 wrote to memory of 1688 3108 oneetx.exe 115 PID 3108 wrote to memory of 1688 3108 oneetx.exe 115 PID 3108 wrote to memory of 1688 3108 oneetx.exe 115 PID 2624 wrote to memory of 1220 2624 vbc.exe 116 PID 2624 wrote to memory of 1220 2624 vbc.exe 116 PID 2624 wrote to memory of 1220 2624 vbc.exe 116 PID 1220 wrote to memory of 4952 1220 cmd.exe 118 PID 1220 wrote to memory of 4952 1220 cmd.exe 118 PID 1220 wrote to memory of 4952 1220 cmd.exe 118 PID 1220 wrote to memory of 2792 1220 cmd.exe 119 PID 1220 wrote to memory of 2792 1220 cmd.exe 119 PID 1220 wrote to memory of 2792 1220 cmd.exe 119 PID 1220 wrote to memory of 4652 1220 cmd.exe 120 PID 1220 wrote to memory of 4652 1220 cmd.exe 120 PID 1220 wrote to memory of 4652 1220 cmd.exe 120 PID 2624 wrote to memory of 4424 2624 vbc.exe 121 PID 2624 wrote to memory of 4424 2624 vbc.exe 121 PID 2624 wrote to memory of 4424 2624 vbc.exe 121 PID 4424 wrote to memory of 4524 4424 cmd.exe 123 PID 4424 wrote to memory of 4524 4424 cmd.exe 123 PID 4424 wrote to memory of 4524 4424 cmd.exe 123 PID 4424 wrote to memory of 2180 4424 cmd.exe 124 PID 4424 wrote to memory of 2180 4424 cmd.exe 124 PID 4424 wrote to memory of 2180 4424 cmd.exe 124 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cda96254eb907caf650daa35dd72b25764d8efe6391c0bc4e6b572fadc08dc9.exe"C:\Users\Admin\AppData\Local\Temp\3cda96254eb907caf650daa35dd72b25764d8efe6391c0bc4e6b572fadc08dc9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2616.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2616.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9000.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9000.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap5235.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap5235.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5736.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5736.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3660PB.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3660PB.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 10846⤵
- Program crash
PID:5040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w42Yi50.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w42Yi50.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 13845⤵
- Program crash
PID:1816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xwHMg41.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xwHMg41.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y64BE70.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y64BE70.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\1000021001\qiv1ow16wzuw.exe"C:\Users\Admin\AppData\Local\Temp\1000021001\qiv1ow16wzuw.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2624 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All6⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:4952
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile7⤵PID:2792
-
-
C:\Windows\SysWOW64\findstr.exefindstr All7⤵PID:4652
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key6⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:4524
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile name="65001" key=clear7⤵PID:2180
-
-
C:\Windows\SysWOW64\findstr.exefindstr Key7⤵PID:392
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"6⤵PID:1612
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:1212
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.17⤵
- Runs ping.exe
PID:3968
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 1405⤵
- Program crash
PID:2660
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000022001\ok2.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\ok2.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OPaNelwwcOiqc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp97FA.tmp"5⤵
- Creates scheduled task(s)
PID:4740
-
-
C:\Users\Admin\AppData\Local\Temp\1000022001\ok2.exe"{path}"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2132
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4652 -ip 46521⤵PID:376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2784 -ip 27841⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2020 -ip 20201⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:4060
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:3484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
667KB
MD51125d277ccde4c5fea05e9b784107388
SHA133a6701d158fdf233d9551d949fee2b1eefa31f4
SHA256156da573614eadb656348d9ac7af4de07134dd7e1f66cb2df40260a830b7b520
SHA5123c335773a982a6f652b8481a82d70983f4d7a64ea9a699c2fbf370413124770bcd6ee629057aa9478ba37125e88e2d8a68a1a50ade95c27722fcc631b4dee4ea
-
Filesize
667KB
MD51125d277ccde4c5fea05e9b784107388
SHA133a6701d158fdf233d9551d949fee2b1eefa31f4
SHA256156da573614eadb656348d9ac7af4de07134dd7e1f66cb2df40260a830b7b520
SHA5123c335773a982a6f652b8481a82d70983f4d7a64ea9a699c2fbf370413124770bcd6ee629057aa9478ba37125e88e2d8a68a1a50ade95c27722fcc631b4dee4ea
-
Filesize
667KB
MD51125d277ccde4c5fea05e9b784107388
SHA133a6701d158fdf233d9551d949fee2b1eefa31f4
SHA256156da573614eadb656348d9ac7af4de07134dd7e1f66cb2df40260a830b7b520
SHA5123c335773a982a6f652b8481a82d70983f4d7a64ea9a699c2fbf370413124770bcd6ee629057aa9478ba37125e88e2d8a68a1a50ade95c27722fcc631b4dee4ea
-
Filesize
754KB
MD540ce4b923a231113415bee85916937a2
SHA1dcc624ce0050cf299c0d51834eb3b417900b4761
SHA256a42cdf9e867b7ddbf1908696ab4b379c6ff544b950277e326bdc5bbacb44b96a
SHA51235168c296c1dc68675f6b895863dce2c34d3ae2e4cfa38f30537a82d82f55365f71e0372aa4d98fba5442f35ec57db01c11cb860265bfd7163dd9cffbab77a92
-
Filesize
754KB
MD540ce4b923a231113415bee85916937a2
SHA1dcc624ce0050cf299c0d51834eb3b417900b4761
SHA256a42cdf9e867b7ddbf1908696ab4b379c6ff544b950277e326bdc5bbacb44b96a
SHA51235168c296c1dc68675f6b895863dce2c34d3ae2e4cfa38f30537a82d82f55365f71e0372aa4d98fba5442f35ec57db01c11cb860265bfd7163dd9cffbab77a92
-
Filesize
754KB
MD540ce4b923a231113415bee85916937a2
SHA1dcc624ce0050cf299c0d51834eb3b417900b4761
SHA256a42cdf9e867b7ddbf1908696ab4b379c6ff544b950277e326bdc5bbacb44b96a
SHA51235168c296c1dc68675f6b895863dce2c34d3ae2e4cfa38f30537a82d82f55365f71e0372aa4d98fba5442f35ec57db01c11cb860265bfd7163dd9cffbab77a92
-
Filesize
754KB
MD540ce4b923a231113415bee85916937a2
SHA1dcc624ce0050cf299c0d51834eb3b417900b4761
SHA256a42cdf9e867b7ddbf1908696ab4b379c6ff544b950277e326bdc5bbacb44b96a
SHA51235168c296c1dc68675f6b895863dce2c34d3ae2e4cfa38f30537a82d82f55365f71e0372aa4d98fba5442f35ec57db01c11cb860265bfd7163dd9cffbab77a92
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
931KB
MD595a73d624ab033df5837eecf35811b77
SHA1158e261c0b082258ac01a709fcd54d220fb7b7a0
SHA256818b9550d8cbe30282922d5d699cc45216b2f8aca4cb803b30d093e51b378935
SHA512fa6fdda0286890d747145ba9e9b12918f0518e5060a83119c2c054847cc4e20222a07cbfbba003dea2fc140744ef2065084eba2b3e91b54436d746f887c33c5d
-
Filesize
931KB
MD595a73d624ab033df5837eecf35811b77
SHA1158e261c0b082258ac01a709fcd54d220fb7b7a0
SHA256818b9550d8cbe30282922d5d699cc45216b2f8aca4cb803b30d093e51b378935
SHA512fa6fdda0286890d747145ba9e9b12918f0518e5060a83119c2c054847cc4e20222a07cbfbba003dea2fc140744ef2065084eba2b3e91b54436d746f887c33c5d
-
Filesize
168KB
MD594158fdb831c345db7d23c8fa826f3da
SHA170bfe24722b6ca173d42eb6c5470e09836709060
SHA2566447e90baa51aaf231c2b664b9aece16ca8567c01c4dad6892662fcd5857ac92
SHA51201a82896ed8bb08e3ae060969ba00dfa104faca83eb11b706529579da7cf490de132217cad67fcda85d161ada72ab055011f2f6210fb4205a4b66bf211272884
-
Filesize
168KB
MD594158fdb831c345db7d23c8fa826f3da
SHA170bfe24722b6ca173d42eb6c5470e09836709060
SHA2566447e90baa51aaf231c2b664b9aece16ca8567c01c4dad6892662fcd5857ac92
SHA51201a82896ed8bb08e3ae060969ba00dfa104faca83eb11b706529579da7cf490de132217cad67fcda85d161ada72ab055011f2f6210fb4205a4b66bf211272884
-
Filesize
777KB
MD51053b6e5bccedfc13309a16603e45265
SHA16342bc59ab5e17572a241e80dc9cf2984e7f4d04
SHA256e31efc3330068c805dd7bc39d8c20346221ee29432c35b58171acd2262a0f2e6
SHA5123226c5f6bd9ff78f6450983eb130f1d47369c7e8883b55527ef8cc066ec4f49f8ed7234cd80e6a6aa1fec4aec3c28cd0ec48e8bca0fee99bc6e8cb3a1483501b
-
Filesize
777KB
MD51053b6e5bccedfc13309a16603e45265
SHA16342bc59ab5e17572a241e80dc9cf2984e7f4d04
SHA256e31efc3330068c805dd7bc39d8c20346221ee29432c35b58171acd2262a0f2e6
SHA5123226c5f6bd9ff78f6450983eb130f1d47369c7e8883b55527ef8cc066ec4f49f8ed7234cd80e6a6aa1fec4aec3c28cd0ec48e8bca0fee99bc6e8cb3a1483501b
-
Filesize
418KB
MD5efaeefa955028f39342bdb3f06e8478f
SHA1f1dbe5970f0da1967632fb9594986eb9f3453f0d
SHA2565e0e3e1b51aa76a542c38d25c71f77f6351e585a14a58a9fa0edb6d2a6e8843a
SHA512f9ca1bdd4a4d99c6dc0844ed90205232ff6355503f323bdaef78d3714a571aa30141732253d026777ed9a4626064ebecd16333838a1a41daa977a5d5b8336405
-
Filesize
418KB
MD5efaeefa955028f39342bdb3f06e8478f
SHA1f1dbe5970f0da1967632fb9594986eb9f3453f0d
SHA2565e0e3e1b51aa76a542c38d25c71f77f6351e585a14a58a9fa0edb6d2a6e8843a
SHA512f9ca1bdd4a4d99c6dc0844ed90205232ff6355503f323bdaef78d3714a571aa30141732253d026777ed9a4626064ebecd16333838a1a41daa977a5d5b8336405
-
Filesize
322KB
MD5d74c0cd7be4d70004b212cf3d3f18021
SHA1bcc1819747e27a7a299921c9c4dab35fbdabb65a
SHA25699b6c77262ca035c6e73eef1f133bf8aced94da775914fb44ceb79bdb9a11ed8
SHA512f740e3d078ef8b00222a1054bc518985cef24f1ea416a7e214c23c3e95da5e3c8b323929999e6ca778e63abea100659bba2edcb2cb84c65486968a4a3a4d3a48
-
Filesize
322KB
MD5d74c0cd7be4d70004b212cf3d3f18021
SHA1bcc1819747e27a7a299921c9c4dab35fbdabb65a
SHA25699b6c77262ca035c6e73eef1f133bf8aced94da775914fb44ceb79bdb9a11ed8
SHA512f740e3d078ef8b00222a1054bc518985cef24f1ea416a7e214c23c3e95da5e3c8b323929999e6ca778e63abea100659bba2edcb2cb84c65486968a4a3a4d3a48
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
235KB
MD5820fb79b63f7d73215e534b5f2581f6c
SHA11c0d9414349a068cec3c38d4326b612c33b9728b
SHA256a52f6a6f24e4051fee936f41830536686ff0ca1596f40c878877b7d6448d7914
SHA512d135eb4ff152416ee0044fd13e9690ef497c9c635e5f924fdf7996c491b73f963226b8e07719ba9ff1519c089c58c5cf9789319a0d627747eba37c5431f70bc8
-
Filesize
235KB
MD5820fb79b63f7d73215e534b5f2581f6c
SHA11c0d9414349a068cec3c38d4326b612c33b9728b
SHA256a52f6a6f24e4051fee936f41830536686ff0ca1596f40c878877b7d6448d7914
SHA512d135eb4ff152416ee0044fd13e9690ef497c9c635e5f924fdf7996c491b73f963226b8e07719ba9ff1519c089c58c5cf9789319a0d627747eba37c5431f70bc8
-
Filesize
1KB
MD5b693602be96ecb9460ca3ba2ea6b51f3
SHA16030ca084981f24482cb9f0b783bfdd6a500401b
SHA25673bb4d163e413a32961f36a68f158f80475ec97a53d9487290c376bd22fd61da
SHA5126bdf56e9a161b5ebc75485afb698a482fe1bce7d55840cec34dd323065160656e071a23206c166f897fbaa5758184a69787c819b4369e7d78cec23891be1c928
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD54b609cebb20f08b79628408f4fa2ad42
SHA1f725278c8bc0527c316e01827f195de5c9a8f934
SHA2562802818c570f9da1ce2e2fe2ff12cd3190b4c287866a3e4dfe2ad3a7df4cecdf
SHA51219111811722223521c8ef801290e2d5d8a49c0800363b9cf4232ca037dbcc515aa16ba6c043193f81388260db0e9a7cdb31b0da8c7ffa5bcad67ddbd842e2c60
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
112KB
MD5780853cddeaee8de70f28a4b255a600b
SHA1ad7a5da33f7ad12946153c497e990720b09005ed
SHA2561055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3
SHA512e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0