Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2023 18:14
Static task
static1
Behavioral task
behavioral1
Sample
961b94d7dff633c874d72324c78a252c5a56d17276c712964d13e41735961424.exe
Resource
win10v2004-20230220-en
General
-
Target
961b94d7dff633c874d72324c78a252c5a56d17276c712964d13e41735961424.exe
-
Size
1.1MB
-
MD5
70fd6f49bfabdda8959891813427223e
-
SHA1
597f33318caedf99c2e92743b328de5f79b456da
-
SHA256
961b94d7dff633c874d72324c78a252c5a56d17276c712964d13e41735961424
-
SHA512
de9fe08459062db7290b6ef4ba18153e91950e5938a638b6beda408a60fcd7ac070f25cf4b9e5d05ccad124f15e8d2f70962dbced1f81adebe592889edbc0df1
-
SSDEEP
24576:3yDiyVnUfineMfvFehFkdvCqW3xY19Xwg/gU6:COyVnR9eHklCti19gO
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
litor
77.91.124.145:4125
-
auth_value
d39ced97dbbaa8eab490390c2e2a6a10
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
Extracted
redline
0409Lucky-bot
135.181.101.75:33666
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v9692KN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v9692KN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz7210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz7210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz7210.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v9692KN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v9692KN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v9692KN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz7210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz7210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz7210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v9692KN.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3036-2418-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/3036-2418-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation w69oR58.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation y59Lw07.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation ok2.exe -
Executes dropped EXE 15 IoCs
pid Process 4112 zap5454.exe 1580 zap3890.exe 2204 zap7387.exe 2200 tz7210.exe 4576 v9692KN.exe 772 w69oR58.exe 4824 1.exe 2868 xcrnl26.exe 3484 y59Lw07.exe 4884 oneetx.exe 4040 qiv1ow16wzuw.exe 3228 ok2.exe 4468 oneetx.exe 3036 ok2.exe 5072 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3608 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz7210.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v9692KN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v9692KN.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap5454.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap3890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap3890.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap7387.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap7387.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 961b94d7dff633c874d72324c78a252c5a56d17276c712964d13e41735961424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 961b94d7dff633c874d72324c78a252c5a56d17276c712964d13e41735961424.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap5454.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 60 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4040 set thread context of 1880 4040 qiv1ow16wzuw.exe 114 PID 3228 set thread context of 3036 3228 ok2.exe 131 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1656 4576 WerFault.exe 95 2660 772 WerFault.exe 98 4948 4040 WerFault.exe 112 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier vbc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1916 schtasks.exe 2788 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 924 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2200 tz7210.exe 2200 tz7210.exe 4576 v9692KN.exe 4576 v9692KN.exe 4824 1.exe 2868 xcrnl26.exe 2868 xcrnl26.exe 4824 1.exe 1880 vbc.exe 3228 ok2.exe 3036 ok2.exe 3036 ok2.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2200 tz7210.exe Token: SeDebugPrivilege 4576 v9692KN.exe Token: SeDebugPrivilege 772 w69oR58.exe Token: SeDebugPrivilege 4824 1.exe Token: SeDebugPrivilege 2868 xcrnl26.exe Token: SeDebugPrivilege 1880 vbc.exe Token: SeDebugPrivilege 3228 ok2.exe Token: SeDebugPrivilege 3036 ok2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3484 y59Lw07.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4112 4636 961b94d7dff633c874d72324c78a252c5a56d17276c712964d13e41735961424.exe 88 PID 4636 wrote to memory of 4112 4636 961b94d7dff633c874d72324c78a252c5a56d17276c712964d13e41735961424.exe 88 PID 4636 wrote to memory of 4112 4636 961b94d7dff633c874d72324c78a252c5a56d17276c712964d13e41735961424.exe 88 PID 4112 wrote to memory of 1580 4112 zap5454.exe 89 PID 4112 wrote to memory of 1580 4112 zap5454.exe 89 PID 4112 wrote to memory of 1580 4112 zap5454.exe 89 PID 1580 wrote to memory of 2204 1580 zap3890.exe 90 PID 1580 wrote to memory of 2204 1580 zap3890.exe 90 PID 1580 wrote to memory of 2204 1580 zap3890.exe 90 PID 2204 wrote to memory of 2200 2204 zap7387.exe 91 PID 2204 wrote to memory of 2200 2204 zap7387.exe 91 PID 2204 wrote to memory of 4576 2204 zap7387.exe 95 PID 2204 wrote to memory of 4576 2204 zap7387.exe 95 PID 2204 wrote to memory of 4576 2204 zap7387.exe 95 PID 1580 wrote to memory of 772 1580 zap3890.exe 98 PID 1580 wrote to memory of 772 1580 zap3890.exe 98 PID 1580 wrote to memory of 772 1580 zap3890.exe 98 PID 772 wrote to memory of 4824 772 w69oR58.exe 101 PID 772 wrote to memory of 4824 772 w69oR58.exe 101 PID 772 wrote to memory of 4824 772 w69oR58.exe 101 PID 4112 wrote to memory of 2868 4112 zap5454.exe 105 PID 4112 wrote to memory of 2868 4112 zap5454.exe 105 PID 4112 wrote to memory of 2868 4112 zap5454.exe 105 PID 4636 wrote to memory of 3484 4636 961b94d7dff633c874d72324c78a252c5a56d17276c712964d13e41735961424.exe 108 PID 4636 wrote to memory of 3484 4636 961b94d7dff633c874d72324c78a252c5a56d17276c712964d13e41735961424.exe 108 PID 4636 wrote to memory of 3484 4636 961b94d7dff633c874d72324c78a252c5a56d17276c712964d13e41735961424.exe 108 PID 3484 wrote to memory of 4884 3484 y59Lw07.exe 109 PID 3484 wrote to memory of 4884 3484 y59Lw07.exe 109 PID 3484 wrote to memory of 4884 3484 y59Lw07.exe 109 PID 4884 wrote to memory of 1916 4884 oneetx.exe 110 PID 4884 wrote to memory of 1916 4884 oneetx.exe 110 PID 4884 wrote to memory of 1916 4884 oneetx.exe 110 PID 4884 wrote to memory of 4040 4884 oneetx.exe 112 PID 4884 wrote to memory of 4040 4884 oneetx.exe 112 PID 4884 wrote to memory of 4040 4884 oneetx.exe 112 PID 4040 wrote to memory of 1880 4040 qiv1ow16wzuw.exe 114 PID 4040 wrote to memory of 1880 4040 qiv1ow16wzuw.exe 114 PID 4040 wrote to memory of 1880 4040 qiv1ow16wzuw.exe 114 PID 4040 wrote to memory of 1880 4040 qiv1ow16wzuw.exe 114 PID 4040 wrote to memory of 1880 4040 qiv1ow16wzuw.exe 114 PID 4884 wrote to memory of 3228 4884 oneetx.exe 117 PID 4884 wrote to memory of 3228 4884 oneetx.exe 117 PID 4884 wrote to memory of 3228 4884 oneetx.exe 117 PID 1880 wrote to memory of 224 1880 vbc.exe 118 PID 1880 wrote to memory of 224 1880 vbc.exe 118 PID 1880 wrote to memory of 224 1880 vbc.exe 118 PID 224 wrote to memory of 4856 224 cmd.exe 120 PID 224 wrote to memory of 4856 224 cmd.exe 120 PID 224 wrote to memory of 4856 224 cmd.exe 120 PID 224 wrote to memory of 1752 224 cmd.exe 121 PID 224 wrote to memory of 1752 224 cmd.exe 121 PID 224 wrote to memory of 1752 224 cmd.exe 121 PID 224 wrote to memory of 4460 224 cmd.exe 122 PID 224 wrote to memory of 4460 224 cmd.exe 122 PID 224 wrote to memory of 4460 224 cmd.exe 122 PID 1880 wrote to memory of 4008 1880 vbc.exe 123 PID 1880 wrote to memory of 4008 1880 vbc.exe 123 PID 1880 wrote to memory of 4008 1880 vbc.exe 123 PID 4008 wrote to memory of 4580 4008 cmd.exe 125 PID 4008 wrote to memory of 4580 4008 cmd.exe 125 PID 4008 wrote to memory of 4580 4008 cmd.exe 125 PID 4008 wrote to memory of 5036 4008 cmd.exe 126 PID 4008 wrote to memory of 5036 4008 cmd.exe 126 PID 4008 wrote to memory of 5036 4008 cmd.exe 126 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\961b94d7dff633c874d72324c78a252c5a56d17276c712964d13e41735961424.exe"C:\Users\Admin\AppData\Local\Temp\961b94d7dff633c874d72324c78a252c5a56d17276c712964d13e41735961424.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5454.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5454.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3890.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3890.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7387.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7387.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7210.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7210.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9692KN.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9692KN.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 10806⤵
- Program crash
PID:1656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w69oR58.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w69oR58.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 9845⤵
- Program crash
PID:2660
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xcrnl26.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xcrnl26.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y59Lw07.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y59Lw07.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\1000021001\qiv1ow16wzuw.exe"C:\Users\Admin\AppData\Local\Temp\1000021001\qiv1ow16wzuw.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1880 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All6⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:4856
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile7⤵PID:1752
-
-
C:\Windows\SysWOW64\findstr.exefindstr All7⤵PID:4460
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key6⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:4580
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile name="65001" key=clear7⤵PID:5036
-
-
C:\Windows\SysWOW64\findstr.exefindstr Key7⤵PID:976
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"6⤵PID:1340
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:4936
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.17⤵
- Runs ping.exe
PID:924
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 2125⤵
- Program crash
PID:4948
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000022001\ok2.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\ok2.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OPaNelwwcOiqc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp923.tmp"5⤵
- Creates scheduled task(s)
PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\1000022001\ok2.exe"{path}"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3608
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4576 -ip 45761⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 772 -ip 7721⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4040 -ip 40401⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:4468
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:5072
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
667KB
MD51125d277ccde4c5fea05e9b784107388
SHA133a6701d158fdf233d9551d949fee2b1eefa31f4
SHA256156da573614eadb656348d9ac7af4de07134dd7e1f66cb2df40260a830b7b520
SHA5123c335773a982a6f652b8481a82d70983f4d7a64ea9a699c2fbf370413124770bcd6ee629057aa9478ba37125e88e2d8a68a1a50ade95c27722fcc631b4dee4ea
-
Filesize
667KB
MD51125d277ccde4c5fea05e9b784107388
SHA133a6701d158fdf233d9551d949fee2b1eefa31f4
SHA256156da573614eadb656348d9ac7af4de07134dd7e1f66cb2df40260a830b7b520
SHA5123c335773a982a6f652b8481a82d70983f4d7a64ea9a699c2fbf370413124770bcd6ee629057aa9478ba37125e88e2d8a68a1a50ade95c27722fcc631b4dee4ea
-
Filesize
667KB
MD51125d277ccde4c5fea05e9b784107388
SHA133a6701d158fdf233d9551d949fee2b1eefa31f4
SHA256156da573614eadb656348d9ac7af4de07134dd7e1f66cb2df40260a830b7b520
SHA5123c335773a982a6f652b8481a82d70983f4d7a64ea9a699c2fbf370413124770bcd6ee629057aa9478ba37125e88e2d8a68a1a50ade95c27722fcc631b4dee4ea
-
Filesize
754KB
MD540ce4b923a231113415bee85916937a2
SHA1dcc624ce0050cf299c0d51834eb3b417900b4761
SHA256a42cdf9e867b7ddbf1908696ab4b379c6ff544b950277e326bdc5bbacb44b96a
SHA51235168c296c1dc68675f6b895863dce2c34d3ae2e4cfa38f30537a82d82f55365f71e0372aa4d98fba5442f35ec57db01c11cb860265bfd7163dd9cffbab77a92
-
Filesize
754KB
MD540ce4b923a231113415bee85916937a2
SHA1dcc624ce0050cf299c0d51834eb3b417900b4761
SHA256a42cdf9e867b7ddbf1908696ab4b379c6ff544b950277e326bdc5bbacb44b96a
SHA51235168c296c1dc68675f6b895863dce2c34d3ae2e4cfa38f30537a82d82f55365f71e0372aa4d98fba5442f35ec57db01c11cb860265bfd7163dd9cffbab77a92
-
Filesize
754KB
MD540ce4b923a231113415bee85916937a2
SHA1dcc624ce0050cf299c0d51834eb3b417900b4761
SHA256a42cdf9e867b7ddbf1908696ab4b379c6ff544b950277e326bdc5bbacb44b96a
SHA51235168c296c1dc68675f6b895863dce2c34d3ae2e4cfa38f30537a82d82f55365f71e0372aa4d98fba5442f35ec57db01c11cb860265bfd7163dd9cffbab77a92
-
Filesize
754KB
MD540ce4b923a231113415bee85916937a2
SHA1dcc624ce0050cf299c0d51834eb3b417900b4761
SHA256a42cdf9e867b7ddbf1908696ab4b379c6ff544b950277e326bdc5bbacb44b96a
SHA51235168c296c1dc68675f6b895863dce2c34d3ae2e4cfa38f30537a82d82f55365f71e0372aa4d98fba5442f35ec57db01c11cb860265bfd7163dd9cffbab77a92
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
930KB
MD5b2b26f9a6bcbc41cd663dc3136536be8
SHA1559277e79df3506f8184eabc365ae2b13cee0fee
SHA256cfda63d9d1b4b53411ce208e66a4ee32c898cd09b5740edb1ef022d817e872dc
SHA512f3169b89bd782a00340a7b199b78f98663a848ed7ec1c6c02c12553a60154e40761fb6921f74783db7a21019579e2d90d7c348743f690ccccbab87ae988dabc3
-
Filesize
930KB
MD5b2b26f9a6bcbc41cd663dc3136536be8
SHA1559277e79df3506f8184eabc365ae2b13cee0fee
SHA256cfda63d9d1b4b53411ce208e66a4ee32c898cd09b5740edb1ef022d817e872dc
SHA512f3169b89bd782a00340a7b199b78f98663a848ed7ec1c6c02c12553a60154e40761fb6921f74783db7a21019579e2d90d7c348743f690ccccbab87ae988dabc3
-
Filesize
168KB
MD594158fdb831c345db7d23c8fa826f3da
SHA170bfe24722b6ca173d42eb6c5470e09836709060
SHA2566447e90baa51aaf231c2b664b9aece16ca8567c01c4dad6892662fcd5857ac92
SHA51201a82896ed8bb08e3ae060969ba00dfa104faca83eb11b706529579da7cf490de132217cad67fcda85d161ada72ab055011f2f6210fb4205a4b66bf211272884
-
Filesize
168KB
MD594158fdb831c345db7d23c8fa826f3da
SHA170bfe24722b6ca173d42eb6c5470e09836709060
SHA2566447e90baa51aaf231c2b664b9aece16ca8567c01c4dad6892662fcd5857ac92
SHA51201a82896ed8bb08e3ae060969ba00dfa104faca83eb11b706529579da7cf490de132217cad67fcda85d161ada72ab055011f2f6210fb4205a4b66bf211272884
-
Filesize
777KB
MD53451b2f937beedba049091821be34106
SHA1de8ec234ce0c6ab5e3d2f6f51acd8bbc5ff26b91
SHA256f57cb5b35dee61ce5894d679a57f069d7a745930202bb3cf9598227cdc63898c
SHA512e22cc55d19452de66cb62783778c3e4ade011cb155831f6f98ca16b18d865b6088919aa40f692f2c19057d4cc4a4c3368d1fb1215677104eb16f0d63016ec4b5
-
Filesize
777KB
MD53451b2f937beedba049091821be34106
SHA1de8ec234ce0c6ab5e3d2f6f51acd8bbc5ff26b91
SHA256f57cb5b35dee61ce5894d679a57f069d7a745930202bb3cf9598227cdc63898c
SHA512e22cc55d19452de66cb62783778c3e4ade011cb155831f6f98ca16b18d865b6088919aa40f692f2c19057d4cc4a4c3368d1fb1215677104eb16f0d63016ec4b5
-
Filesize
418KB
MD5e3962aba4b6abc27930ec664f5a97080
SHA166d04802f965e80f1f5a5b6c14b537823589ef8a
SHA256dafb157b9c942c39ae6148e28332f7df852a3c5ce3b7383a95095efb40a6a5c5
SHA5128c1e7c067bac5c094467897575ffbc7f6e5b73e572806a4c5724aada16b1c98a67b789485423d5207a6bb1d2d192238e03053c431462b11f00df026e6da9d6ae
-
Filesize
418KB
MD5e3962aba4b6abc27930ec664f5a97080
SHA166d04802f965e80f1f5a5b6c14b537823589ef8a
SHA256dafb157b9c942c39ae6148e28332f7df852a3c5ce3b7383a95095efb40a6a5c5
SHA5128c1e7c067bac5c094467897575ffbc7f6e5b73e572806a4c5724aada16b1c98a67b789485423d5207a6bb1d2d192238e03053c431462b11f00df026e6da9d6ae
-
Filesize
322KB
MD57d5472c1af7e948d145c3f857b258449
SHA10b9e99aa97bb85309491c93c890ce05c3bf80208
SHA2567d398fe5374d1422dcee7897936cfcb3114da7d20c984caab371dbc59c946381
SHA5128513fef09898f1a627b40931fbfaecc97e7ee187b6d681381d35893b6fd1fec09a51f6a0ad8b37391994682ccf19aa73eece04a85dc76c2019fc2834aecad93a
-
Filesize
322KB
MD57d5472c1af7e948d145c3f857b258449
SHA10b9e99aa97bb85309491c93c890ce05c3bf80208
SHA2567d398fe5374d1422dcee7897936cfcb3114da7d20c984caab371dbc59c946381
SHA5128513fef09898f1a627b40931fbfaecc97e7ee187b6d681381d35893b6fd1fec09a51f6a0ad8b37391994682ccf19aa73eece04a85dc76c2019fc2834aecad93a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
235KB
MD5fbbe86b8a00f8bce915ca6d2509a398f
SHA1e2e51accc82dce5164aaeb0cb627b51ef033bc5f
SHA256db65daa67b97620640d0cd89695ee6657d229a0e55f148fb63e559eaaab564df
SHA5128e0bca92a282c484c7337ada500e43e74b3f4c6fc76fae0f2bfcc56e8a8e8caf9bc08b794e93123252df7cbd57045dcc14d7694a9bcc94a2943f6e0374d68187
-
Filesize
235KB
MD5fbbe86b8a00f8bce915ca6d2509a398f
SHA1e2e51accc82dce5164aaeb0cb627b51ef033bc5f
SHA256db65daa67b97620640d0cd89695ee6657d229a0e55f148fb63e559eaaab564df
SHA5128e0bca92a282c484c7337ada500e43e74b3f4c6fc76fae0f2bfcc56e8a8e8caf9bc08b794e93123252df7cbd57045dcc14d7694a9bcc94a2943f6e0374d68187
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5367544a2a5551a41c869eb1b0b5871c3
SHA19051340b95090c07deda0a1df3a9c0b9233f5054
SHA256eb0e2b2ee04cab66e2f7930ea82a5f1b42469ac50e063a8492f9c585f90bc542
SHA5126d1275291530cb8b9944db296c4aed376765015ad6bbf51f4475a347776c99dbb2e748d0c331d89c9e6118adf641ed10e390c8ccb8ae4de4811c858d195cc34c
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
112KB
MD5780853cddeaee8de70f28a4b255a600b
SHA1ad7a5da33f7ad12946153c497e990720b09005ed
SHA2561055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3
SHA512e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
1KB
MD58cda3392cf89c83320c05fd6d8a2a288
SHA1b3ed2bfc8a075951996fe664617e39af2e071854
SHA256174a93a1c649e402ac14a67c9e2bcc572c6f3f9ce05dd25621ca217ec9fb9ccf
SHA512d27c973ac5ccf0c0939e0cbc263551589655b52b75f26334a2f2c753aec24558308fdff8798077a6df2c71bc96d889edeeafa1f2e743990812fa9206a1ed73c7
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0