Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 21:27
Static task
static1
General
-
Target
1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155.exe
-
Size
1.0MB
-
MD5
a39d43e28d4c086689d74885173d30b9
-
SHA1
010d589bb030b2e68fa1487452c495998ef8339b
-
SHA256
1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155
-
SHA512
deee94d4ef13cc7d2c15a6eefc77e24e1e9e018efe42797d91fba38c0b8374eb69b87eee98717d30930e4755bb8cd2ed399897af510c40378ec41d4b42199fa3
-
SSDEEP
24576:VynHjpa94sITvEP+Pxu33Thjjqr8ZJLMjTY/eUj3xfyM:wnHjpa943L1P2Vj/JLMW/3xa
Malware Config
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
brat
176.113.115.145:4125
-
auth_value
1f9c658aed2f70f42f99a57a005561cf
Signatures
-
Processes:
az328134.execor5691.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az328134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az328134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az328134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az328134.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor5691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor5691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor5691.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az328134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor5691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor5691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor5691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az328134.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 16 IoCs
Processes:
resource yara_rule behavioral1/memory/4044-235-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-236-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-238-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-240-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-242-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-244-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-246-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-248-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-250-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-252-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-254-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-256-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-258-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-260-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-262-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4044-264-0x0000000002520000-0x000000000255F000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oneetx.exebu180731.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation bu180731.exe -
Executes dropped EXE 12 IoCs
Processes:
kina7658.exekina0811.exekina3162.exeaz328134.exebu180731.exeoneetx.execor5691.exeoneetx.exedlP98s29.exeen786277.exeoneetx.exeoneetx.exepid process 1188 kina7658.exe 4432 kina0811.exe 4136 kina3162.exe 2332 az328134.exe 116 bu180731.exe 4168 oneetx.exe 3080 cor5691.exe 3388 oneetx.exe 4044 dlP98s29.exe 3984 en786277.exe 4964 oneetx.exe 1552 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2264 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
az328134.execor5691.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az328134.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor5691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor5691.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
kina0811.exekina3162.exe1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155.exekina7658.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina0811.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina3162.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina3162.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina7658.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina7658.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina0811.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3404 116 WerFault.exe bu180731.exe 648 116 WerFault.exe bu180731.exe 4628 116 WerFault.exe bu180731.exe 2812 116 WerFault.exe bu180731.exe 4120 116 WerFault.exe bu180731.exe 4488 116 WerFault.exe bu180731.exe 3736 116 WerFault.exe bu180731.exe 4812 116 WerFault.exe bu180731.exe 2376 116 WerFault.exe bu180731.exe 636 116 WerFault.exe bu180731.exe 2000 4168 WerFault.exe oneetx.exe 4420 4168 WerFault.exe oneetx.exe 1584 4168 WerFault.exe oneetx.exe 1712 4168 WerFault.exe oneetx.exe 1256 4168 WerFault.exe oneetx.exe 1812 4168 WerFault.exe oneetx.exe 3988 4168 WerFault.exe oneetx.exe 2712 4168 WerFault.exe oneetx.exe 208 4168 WerFault.exe oneetx.exe 4020 4168 WerFault.exe oneetx.exe 1820 4168 WerFault.exe oneetx.exe 1028 4168 WerFault.exe oneetx.exe 4888 3388 WerFault.exe oneetx.exe 1060 3080 WerFault.exe cor5691.exe 3440 4044 WerFault.exe dlP98s29.exe 868 4168 WerFault.exe oneetx.exe 1544 4168 WerFault.exe oneetx.exe 3840 4168 WerFault.exe oneetx.exe 2240 4964 WerFault.exe oneetx.exe 1972 4168 WerFault.exe oneetx.exe 3384 1552 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
az328134.execor5691.exedlP98s29.exeen786277.exepid process 2332 az328134.exe 2332 az328134.exe 3080 cor5691.exe 3080 cor5691.exe 4044 dlP98s29.exe 4044 dlP98s29.exe 3984 en786277.exe 3984 en786277.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
az328134.execor5691.exedlP98s29.exeen786277.exedescription pid process Token: SeDebugPrivilege 2332 az328134.exe Token: SeDebugPrivilege 3080 cor5691.exe Token: SeDebugPrivilege 4044 dlP98s29.exe Token: SeDebugPrivilege 3984 en786277.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
bu180731.exepid process 116 bu180731.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155.exekina7658.exekina0811.exekina3162.exebu180731.exeoneetx.exedescription pid process target process PID 5012 wrote to memory of 1188 5012 1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155.exe kina7658.exe PID 5012 wrote to memory of 1188 5012 1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155.exe kina7658.exe PID 5012 wrote to memory of 1188 5012 1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155.exe kina7658.exe PID 1188 wrote to memory of 4432 1188 kina7658.exe kina0811.exe PID 1188 wrote to memory of 4432 1188 kina7658.exe kina0811.exe PID 1188 wrote to memory of 4432 1188 kina7658.exe kina0811.exe PID 4432 wrote to memory of 4136 4432 kina0811.exe kina3162.exe PID 4432 wrote to memory of 4136 4432 kina0811.exe kina3162.exe PID 4432 wrote to memory of 4136 4432 kina0811.exe kina3162.exe PID 4136 wrote to memory of 2332 4136 kina3162.exe az328134.exe PID 4136 wrote to memory of 2332 4136 kina3162.exe az328134.exe PID 4136 wrote to memory of 116 4136 kina3162.exe bu180731.exe PID 4136 wrote to memory of 116 4136 kina3162.exe bu180731.exe PID 4136 wrote to memory of 116 4136 kina3162.exe bu180731.exe PID 116 wrote to memory of 4168 116 bu180731.exe oneetx.exe PID 116 wrote to memory of 4168 116 bu180731.exe oneetx.exe PID 116 wrote to memory of 4168 116 bu180731.exe oneetx.exe PID 4432 wrote to memory of 3080 4432 kina0811.exe cor5691.exe PID 4432 wrote to memory of 3080 4432 kina0811.exe cor5691.exe PID 4432 wrote to memory of 3080 4432 kina0811.exe cor5691.exe PID 4168 wrote to memory of 3756 4168 oneetx.exe schtasks.exe PID 4168 wrote to memory of 3756 4168 oneetx.exe schtasks.exe PID 4168 wrote to memory of 3756 4168 oneetx.exe schtasks.exe PID 1188 wrote to memory of 4044 1188 kina7658.exe dlP98s29.exe PID 1188 wrote to memory of 4044 1188 kina7658.exe dlP98s29.exe PID 1188 wrote to memory of 4044 1188 kina7658.exe dlP98s29.exe PID 5012 wrote to memory of 3984 5012 1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155.exe en786277.exe PID 5012 wrote to memory of 3984 5012 1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155.exe en786277.exe PID 5012 wrote to memory of 3984 5012 1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155.exe en786277.exe PID 4168 wrote to memory of 2264 4168 oneetx.exe rundll32.exe PID 4168 wrote to memory of 2264 4168 oneetx.exe rundll32.exe PID 4168 wrote to memory of 2264 4168 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155.exe"C:\Users\Admin\AppData\Local\Temp\1a0a0558d27bfb6cbd56096536a9d15dbee942d7c08acdaf87660ed02ae59155.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7658.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7658.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0811.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0811.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3162.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3162.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az328134.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az328134.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu180731.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu180731.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 6966⤵
- Program crash
PID:3404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 7806⤵
- Program crash
PID:648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 8566⤵
- Program crash
PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 9806⤵
- Program crash
PID:2812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 9966⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 9806⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 12166⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 12646⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 13526⤵
- Program crash
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 6927⤵
- Program crash
PID:2000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 9087⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 10127⤵
- Program crash
PID:1584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 10887⤵
- Program crash
PID:1712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 11247⤵
- Program crash
PID:1256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 11647⤵
- Program crash
PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 11727⤵
- Program crash
PID:3988
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:3756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 10007⤵
- Program crash
PID:2712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 12967⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 6927⤵
- Program crash
PID:4020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 13127⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 14287⤵
- Program crash
PID:1028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 11447⤵
- Program crash
PID:868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 16447⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 11247⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 16527⤵
- Program crash
PID:1972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 8646⤵
- Program crash
PID:636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor5691.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor5691.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 10805⤵
- Program crash
PID:1060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dlP98s29.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dlP98s29.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 13524⤵
- Program crash
PID:3440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en786277.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en786277.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 116 -ip 1161⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 116 -ip 1161⤵PID:2692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 116 -ip 1161⤵PID:4340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 116 -ip 1161⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 116 -ip 1161⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 116 -ip 1161⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 116 -ip 1161⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 116 -ip 1161⤵PID:1888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 116 -ip 1161⤵PID:3084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 116 -ip 1161⤵PID:3328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4168 -ip 41681⤵PID:880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4168 -ip 41681⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4168 -ip 41681⤵PID:1036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4168 -ip 41681⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4168 -ip 41681⤵PID:3540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4168 -ip 41681⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4168 -ip 41681⤵PID:924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4168 -ip 41681⤵PID:2460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4168 -ip 41681⤵PID:1116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4168 -ip 41681⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4168 -ip 41681⤵PID:4016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4168 -ip 41681⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 3242⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3388 -ip 33881⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3080 -ip 30801⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4044 -ip 40441⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4168 -ip 41681⤵PID:2784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4168 -ip 41681⤵PID:2832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4168 -ip 41681⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 3122⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4964 -ip 49641⤵PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4168 -ip 41681⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 3202⤵
- Program crash
PID:3384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1552 -ip 15521⤵PID:2268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
168KB
MD5f6e26db2d6dbb414faa5aee14deac782
SHA174f42d5ca4dda408457af34b934e49d5675d630f
SHA2563f8af6c7f3ea9bdcc11c2211b414a72d55f64d266f0a65fae5fba1bfb9ecddbc
SHA512ce4499b4b3bd754e6dd0eaacb8babc1807db7805cd49af846e235f606d032fc3f1bebad2873e6877e25a7c6535c50f5594f16e121ab5d59be1f55d30df53a967
-
Filesize
168KB
MD5f6e26db2d6dbb414faa5aee14deac782
SHA174f42d5ca4dda408457af34b934e49d5675d630f
SHA2563f8af6c7f3ea9bdcc11c2211b414a72d55f64d266f0a65fae5fba1bfb9ecddbc
SHA512ce4499b4b3bd754e6dd0eaacb8babc1807db7805cd49af846e235f606d032fc3f1bebad2873e6877e25a7c6535c50f5594f16e121ab5d59be1f55d30df53a967
-
Filesize
921KB
MD5a4743b07869c8f51ab56bf615e25df8e
SHA18f7fb70e473862355bc405ccf4c2ec1dfa8d7859
SHA25697144c8d031b3294cc0063f1b36f977ce515e1f64b653db5a9002eb1d94a0983
SHA5126e9f6c7b944338e5c637945e681520eb30ad2acc1b02ec6deee696a774e0a258b8846b71fb14ef41a485d848c427e02fb2f42b44be87e716397fb20d2e1f6a3d
-
Filesize
921KB
MD5a4743b07869c8f51ab56bf615e25df8e
SHA18f7fb70e473862355bc405ccf4c2ec1dfa8d7859
SHA25697144c8d031b3294cc0063f1b36f977ce515e1f64b653db5a9002eb1d94a0983
SHA5126e9f6c7b944338e5c637945e681520eb30ad2acc1b02ec6deee696a774e0a258b8846b71fb14ef41a485d848c427e02fb2f42b44be87e716397fb20d2e1f6a3d
-
Filesize
297KB
MD52a9fd5d45a5cf02ba9f3a0bee1cc0dd7
SHA148329798e1546d506ff5f9376111ee6841388ff4
SHA25665ac842166edfc89a2162728d40718291014bae9dec00f91d1a33d7f27eb06e4
SHA5124ffca56d65c6cfce77dcbbad1331f2922e62095e435bcae8644f68fe10c9f210c8ceee9de37c62afa04614b48763f41d4e431aff2202ed0864a7eed0a06ae488
-
Filesize
297KB
MD52a9fd5d45a5cf02ba9f3a0bee1cc0dd7
SHA148329798e1546d506ff5f9376111ee6841388ff4
SHA25665ac842166edfc89a2162728d40718291014bae9dec00f91d1a33d7f27eb06e4
SHA5124ffca56d65c6cfce77dcbbad1331f2922e62095e435bcae8644f68fe10c9f210c8ceee9de37c62afa04614b48763f41d4e431aff2202ed0864a7eed0a06ae488
-
Filesize
589KB
MD5d5b2f6400c555b7e8ef9dfe5346ba735
SHA12cd3b33ae459714b303ff5355d4b398b5c32eb69
SHA25677eeb96eb48d4f03493ccd48088dc63375fe55b48743e255f3b08903738d1aa9
SHA512d45a13979f607979b77f9e010f94ac7ce132d5962833e211f1ae0ea1235a2aa71b091449a73d1a9d1da36ac764a86e14cde669720386ac0900a08267c5f30d1f
-
Filesize
589KB
MD5d5b2f6400c555b7e8ef9dfe5346ba735
SHA12cd3b33ae459714b303ff5355d4b398b5c32eb69
SHA25677eeb96eb48d4f03493ccd48088dc63375fe55b48743e255f3b08903738d1aa9
SHA512d45a13979f607979b77f9e010f94ac7ce132d5962833e211f1ae0ea1235a2aa71b091449a73d1a9d1da36ac764a86e14cde669720386ac0900a08267c5f30d1f
-
Filesize
239KB
MD555989f9d3d9da22120ac2bbb1d541eba
SHA16c65361c51a9284da56c27e207d10a9e2599ca4c
SHA256bf15998bedee071efe1597d7630e6455949ef8bd35af58baec15b0c0b1cd73a6
SHA5128b216d517b62d0060b3581a6c5e4a594f01e20863be41f7faafa11d4b0c5371197a0bfb44188dd8271ff649fd45c490dceefaa26a9444a2578398befac1331c6
-
Filesize
239KB
MD555989f9d3d9da22120ac2bbb1d541eba
SHA16c65361c51a9284da56c27e207d10a9e2599ca4c
SHA256bf15998bedee071efe1597d7630e6455949ef8bd35af58baec15b0c0b1cd73a6
SHA5128b216d517b62d0060b3581a6c5e4a594f01e20863be41f7faafa11d4b0c5371197a0bfb44188dd8271ff649fd45c490dceefaa26a9444a2578398befac1331c6
-
Filesize
316KB
MD57f1d2c14b20c784707df536572bd7a9f
SHA194bc9fc3ee898e74c1bb15a2c3b78ef9cee66652
SHA256c79f054df8ed43f9dbdeb11d0cc70e53257bcea07c5c34988fac8738dda86e10
SHA5126112418ab4c2de407e81263be33a83111ca63130fee3e17e9826b0ccbd9a6937f00564fae4b1c0038957729fcbb9863747a051191e6b7e42619f17bee6eb125e
-
Filesize
316KB
MD57f1d2c14b20c784707df536572bd7a9f
SHA194bc9fc3ee898e74c1bb15a2c3b78ef9cee66652
SHA256c79f054df8ed43f9dbdeb11d0cc70e53257bcea07c5c34988fac8738dda86e10
SHA5126112418ab4c2de407e81263be33a83111ca63130fee3e17e9826b0ccbd9a6937f00564fae4b1c0038957729fcbb9863747a051191e6b7e42619f17bee6eb125e
-
Filesize
11KB
MD58f39a3fbb2f51390399fb117bcb768ff
SHA10d74c92fdf8de1a3e9896dd249986aca2f30a600
SHA256e37723f401f5f214fc2d90faccb03313b19e9d082d0bb46e8bfe817f20828aad
SHA512c010ec3705c578b2fd68537d77e9d42e192d3ecbcbf09b822116d13621f041e27e4edd5f0a410981c759ce2452a103dfdca6ceb548c3d7cd0822401151be0c0c
-
Filesize
11KB
MD58f39a3fbb2f51390399fb117bcb768ff
SHA10d74c92fdf8de1a3e9896dd249986aca2f30a600
SHA256e37723f401f5f214fc2d90faccb03313b19e9d082d0bb46e8bfe817f20828aad
SHA512c010ec3705c578b2fd68537d77e9d42e192d3ecbcbf09b822116d13621f041e27e4edd5f0a410981c759ce2452a103dfdca6ceb548c3d7cd0822401151be0c0c
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5