Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 21:19
Static task
static1
General
-
Target
b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948.exe
-
Size
1.0MB
-
MD5
880d48f601ed9a669c397c124ebf401f
-
SHA1
3c9474fa306c5cd3ec75dbfc8d0190ed6ef379ff
-
SHA256
b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948
-
SHA512
58d4edf03fa393b06644a867af7df5b6e7803e74101aa6d5be041f46b08ebf83325970b055c36579b6da1059408133d82b97d981ef9d886ee467d70cddedd560
-
SSDEEP
24576:lygG50UVTSIxh/rnb1YHLsDsECIBBR7OZxfsws:AlzVTSihr6LGsl6Ixk
Malware Config
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
brat
176.113.115.145:4125
-
auth_value
1f9c658aed2f70f42f99a57a005561cf
Signatures
-
Processes:
az621220.execor6160.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az621220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az621220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az621220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az621220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor6160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor6160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor6160.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az621220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor6160.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor6160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor6160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az621220.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2896-232-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-235-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-233-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-237-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-239-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-241-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-243-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-245-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-247-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-249-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-251-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-253-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-255-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-257-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-259-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-261-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-263-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2896-1155-0x0000000004A70000-0x0000000004A80000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bu839890.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation bu839890.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 11 IoCs
Processes:
kina1263.exekina6076.exekina9663.exeaz621220.exebu839890.exeoneetx.execor6160.exedXb00s01.exeen780609.exeoneetx.exeoneetx.exepid process 1896 kina1263.exe 2052 kina6076.exe 3844 kina9663.exe 3812 az621220.exe 5116 bu839890.exe 1916 oneetx.exe 4972 cor6160.exe 2896 dXb00s01.exe 4544 en780609.exe 4972 oneetx.exe 3904 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4576 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
az621220.execor6160.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az621220.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor6160.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor6160.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948.exekina1263.exekina6076.exekina9663.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina1263.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina1263.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina6076.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina6076.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina9663.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina9663.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1576 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4380 5116 WerFault.exe bu839890.exe 2372 5116 WerFault.exe bu839890.exe 4612 5116 WerFault.exe bu839890.exe 2804 5116 WerFault.exe bu839890.exe 4740 5116 WerFault.exe bu839890.exe 3852 5116 WerFault.exe bu839890.exe 4712 5116 WerFault.exe bu839890.exe 1600 5116 WerFault.exe bu839890.exe 1992 5116 WerFault.exe bu839890.exe 4836 5116 WerFault.exe bu839890.exe 2600 1916 WerFault.exe oneetx.exe 3404 1916 WerFault.exe oneetx.exe 1604 1916 WerFault.exe oneetx.exe 2484 1916 WerFault.exe oneetx.exe 840 1916 WerFault.exe oneetx.exe 2236 1916 WerFault.exe oneetx.exe 4336 1916 WerFault.exe oneetx.exe 3664 1916 WerFault.exe oneetx.exe 1464 1916 WerFault.exe oneetx.exe 3220 1916 WerFault.exe oneetx.exe 748 1916 WerFault.exe oneetx.exe 3040 1916 WerFault.exe oneetx.exe 4756 4972 WerFault.exe cor6160.exe 3976 2896 WerFault.exe dXb00s01.exe 1400 1916 WerFault.exe oneetx.exe 3048 1916 WerFault.exe oneetx.exe 3600 1916 WerFault.exe oneetx.exe 2052 4972 WerFault.exe oneetx.exe 1500 1916 WerFault.exe oneetx.exe 4684 3904 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
az621220.execor6160.exedXb00s01.exeen780609.exepid process 3812 az621220.exe 3812 az621220.exe 4972 cor6160.exe 4972 cor6160.exe 2896 dXb00s01.exe 2896 dXb00s01.exe 4544 en780609.exe 4544 en780609.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
az621220.execor6160.exedXb00s01.exeen780609.exedescription pid process Token: SeDebugPrivilege 3812 az621220.exe Token: SeDebugPrivilege 4972 cor6160.exe Token: SeDebugPrivilege 2896 dXb00s01.exe Token: SeDebugPrivilege 4544 en780609.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
bu839890.exepid process 5116 bu839890.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948.exekina1263.exekina6076.exekina9663.exebu839890.exeoneetx.exedescription pid process target process PID 2232 wrote to memory of 1896 2232 b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948.exe kina1263.exe PID 2232 wrote to memory of 1896 2232 b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948.exe kina1263.exe PID 2232 wrote to memory of 1896 2232 b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948.exe kina1263.exe PID 1896 wrote to memory of 2052 1896 kina1263.exe kina6076.exe PID 1896 wrote to memory of 2052 1896 kina1263.exe kina6076.exe PID 1896 wrote to memory of 2052 1896 kina1263.exe kina6076.exe PID 2052 wrote to memory of 3844 2052 kina6076.exe kina9663.exe PID 2052 wrote to memory of 3844 2052 kina6076.exe kina9663.exe PID 2052 wrote to memory of 3844 2052 kina6076.exe kina9663.exe PID 3844 wrote to memory of 3812 3844 kina9663.exe az621220.exe PID 3844 wrote to memory of 3812 3844 kina9663.exe az621220.exe PID 3844 wrote to memory of 5116 3844 kina9663.exe bu839890.exe PID 3844 wrote to memory of 5116 3844 kina9663.exe bu839890.exe PID 3844 wrote to memory of 5116 3844 kina9663.exe bu839890.exe PID 5116 wrote to memory of 1916 5116 bu839890.exe oneetx.exe PID 5116 wrote to memory of 1916 5116 bu839890.exe oneetx.exe PID 5116 wrote to memory of 1916 5116 bu839890.exe oneetx.exe PID 2052 wrote to memory of 4972 2052 kina6076.exe cor6160.exe PID 2052 wrote to memory of 4972 2052 kina6076.exe cor6160.exe PID 2052 wrote to memory of 4972 2052 kina6076.exe cor6160.exe PID 1916 wrote to memory of 1548 1916 oneetx.exe schtasks.exe PID 1916 wrote to memory of 1548 1916 oneetx.exe schtasks.exe PID 1916 wrote to memory of 1548 1916 oneetx.exe schtasks.exe PID 1896 wrote to memory of 2896 1896 kina1263.exe dXb00s01.exe PID 1896 wrote to memory of 2896 1896 kina1263.exe dXb00s01.exe PID 1896 wrote to memory of 2896 1896 kina1263.exe dXb00s01.exe PID 2232 wrote to memory of 4544 2232 b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948.exe en780609.exe PID 2232 wrote to memory of 4544 2232 b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948.exe en780609.exe PID 2232 wrote to memory of 4544 2232 b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948.exe en780609.exe PID 1916 wrote to memory of 4576 1916 oneetx.exe rundll32.exe PID 1916 wrote to memory of 4576 1916 oneetx.exe rundll32.exe PID 1916 wrote to memory of 4576 1916 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948.exe"C:\Users\Admin\AppData\Local\Temp\b646447cf1363bbc72b933b31183f718738316541619d5c9a5aedad675fe9948.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1263.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1263.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6076.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6076.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina9663.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina9663.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az621220.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az621220.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu839890.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu839890.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 6966⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 7806⤵
- Program crash
PID:2372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 7966⤵
- Program crash
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 8006⤵
- Program crash
PID:2804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 8006⤵
- Program crash
PID:4740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 8006⤵
- Program crash
PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 12166⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 12526⤵
- Program crash
PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 13126⤵
- Program crash
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 6927⤵
- Program crash
PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 9327⤵
- Program crash
PID:3404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 10927⤵
- Program crash
PID:1604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 11007⤵
- Program crash
PID:2484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 11287⤵
- Program crash
PID:840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 11447⤵
- Program crash
PID:2236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 12087⤵
- Program crash
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 11847⤵
- Program crash
PID:3664
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:1548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 10127⤵
- Program crash
PID:1464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 13047⤵
- Program crash
PID:3220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 13247⤵
- Program crash
PID:748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 13127⤵
- Program crash
PID:3040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 11927⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 16087⤵
- Program crash
PID:3048
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 12087⤵
- Program crash
PID:3600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 16207⤵
- Program crash
PID:1500
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 13886⤵
- Program crash
PID:4836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor6160.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor6160.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 10805⤵
- Program crash
PID:4756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dXb00s01.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dXb00s01.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 13524⤵
- Program crash
PID:3976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en780609.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en780609.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5116 -ip 51161⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5116 -ip 51161⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5116 -ip 51161⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5116 -ip 51161⤵PID:2660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5116 -ip 51161⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5116 -ip 51161⤵PID:3576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5116 -ip 51161⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5116 -ip 51161⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5116 -ip 51161⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5116 -ip 51161⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1916 -ip 19161⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1916 -ip 19161⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1916 -ip 19161⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1916 -ip 19161⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1916 -ip 19161⤵PID:2876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1916 -ip 19161⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1916 -ip 19161⤵PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1916 -ip 19161⤵PID:1292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1916 -ip 19161⤵PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1916 -ip 19161⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1916 -ip 19161⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 1916 -ip 19161⤵PID:2636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 4972 -ip 49721⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 2896 -ip 28961⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1916 -ip 19161⤵PID:780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 1916 -ip 19161⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 1916 -ip 19161⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 3122⤵
- Program crash
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4972 -ip 49721⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1916 -ip 19161⤵PID:4956
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1576
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 3202⤵
- Program crash
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3904 -ip 39041⤵PID:1992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
168KB
MD529562157a24bcef8d864bb2f02d03835
SHA124b7f42f916913a38ae7df46553fc98b46265616
SHA25615b18077b7b87dc04fcb04d44f1cc56cb9763b946ffb769e58a1ba9647f2d069
SHA512e1008fb0a35b497245da93703bdd9256b3cce1f03039a3752b5404729f5e7deb8a8f9ab24e8514b4279a0c32c8c2e057373a8cd4f4f4a58a71eee9878cae5429
-
Filesize
168KB
MD529562157a24bcef8d864bb2f02d03835
SHA124b7f42f916913a38ae7df46553fc98b46265616
SHA25615b18077b7b87dc04fcb04d44f1cc56cb9763b946ffb769e58a1ba9647f2d069
SHA512e1008fb0a35b497245da93703bdd9256b3cce1f03039a3752b5404729f5e7deb8a8f9ab24e8514b4279a0c32c8c2e057373a8cd4f4f4a58a71eee9878cae5429
-
Filesize
920KB
MD52df25b82ac0e11a5a77c8692f263fed6
SHA15cad98673857d802e4dbc2b433559f13feb9fe56
SHA2566955cef1b76e9a7ebc84fae684050fd620cfbbf42df730a2d8fd72409da913fc
SHA5122cff94a8bf40afea58931da3f14df0720b1003011b40e6fba20cdb7976ec080f6052aaf8f1834b6f707801660f4450bfc43e69de5382dad99bccccea615c389e
-
Filesize
920KB
MD52df25b82ac0e11a5a77c8692f263fed6
SHA15cad98673857d802e4dbc2b433559f13feb9fe56
SHA2566955cef1b76e9a7ebc84fae684050fd620cfbbf42df730a2d8fd72409da913fc
SHA5122cff94a8bf40afea58931da3f14df0720b1003011b40e6fba20cdb7976ec080f6052aaf8f1834b6f707801660f4450bfc43e69de5382dad99bccccea615c389e
-
Filesize
297KB
MD5d890e7b236620e0813c2db246779fe1d
SHA19b87d68a5e3e81f4fd77ea7249e0729c48fb7864
SHA256325dca9e8f56bc9c755935c68dd4503bbfe1bd7302a03361d6150dc1329a0bdc
SHA512d256840011cf40ad773bd223fcd0d8d0afaba87855a58fa3b5fd3b749ddba62ee2e589ea0acc198be68100ac2f24e9cc624aa966ab3eda3dad73551d37e9f88b
-
Filesize
297KB
MD5d890e7b236620e0813c2db246779fe1d
SHA19b87d68a5e3e81f4fd77ea7249e0729c48fb7864
SHA256325dca9e8f56bc9c755935c68dd4503bbfe1bd7302a03361d6150dc1329a0bdc
SHA512d256840011cf40ad773bd223fcd0d8d0afaba87855a58fa3b5fd3b749ddba62ee2e589ea0acc198be68100ac2f24e9cc624aa966ab3eda3dad73551d37e9f88b
-
Filesize
589KB
MD52f4825dfee6effbd006b5fa50ff371f5
SHA189c7ffbd623fe702eb1970209f8245e6ed2fd5e1
SHA2569ff7a951f72ee8b86d3471c33abd5f8d765ab556a26e6d0d4ac240ee62cc8d36
SHA512837cef6cf933a367d03141c2d91d5888cfa866f10ba77b6a645de503b25836b593b31b387da502bb90f73c3d5e0813e2470422b08460b7f3e20ecd56cef87c4c
-
Filesize
589KB
MD52f4825dfee6effbd006b5fa50ff371f5
SHA189c7ffbd623fe702eb1970209f8245e6ed2fd5e1
SHA2569ff7a951f72ee8b86d3471c33abd5f8d765ab556a26e6d0d4ac240ee62cc8d36
SHA512837cef6cf933a367d03141c2d91d5888cfa866f10ba77b6a645de503b25836b593b31b387da502bb90f73c3d5e0813e2470422b08460b7f3e20ecd56cef87c4c
-
Filesize
239KB
MD554ef0491aff01e71c7d1fe8d5182f5fc
SHA120b8af878cffe51c023970594342d3701189f7fd
SHA2566c26b6119e15c9c3145250310f360a9ad5819fc8f266fd961f41359c86d76e8a
SHA51231e5c3f87a450f8fa9dbdf7e1d0e21beeadee67b25ee1586b42a6fd0ddfe0247d17f320ee6a4a98f7c933581ed77fbd0ff69939cfdbf4ffb60d8913b24e59d34
-
Filesize
239KB
MD554ef0491aff01e71c7d1fe8d5182f5fc
SHA120b8af878cffe51c023970594342d3701189f7fd
SHA2566c26b6119e15c9c3145250310f360a9ad5819fc8f266fd961f41359c86d76e8a
SHA51231e5c3f87a450f8fa9dbdf7e1d0e21beeadee67b25ee1586b42a6fd0ddfe0247d17f320ee6a4a98f7c933581ed77fbd0ff69939cfdbf4ffb60d8913b24e59d34
-
Filesize
316KB
MD52aa7de52392e19b926eae71c8586e140
SHA11bc600401af8de152f5bfb67361728ffd4169fda
SHA256164325f6ddbe5344e928f9bb66c9ed7fcbbffaa2f90e1f80d0289938a710ec03
SHA512044bce3a94a19000530ac6594376d00f7555f8e388e78a6c84c03351c317fb753b9116815a7e1f1cc538a0e5ab48534a3f0d59b53842037fdde33269a67f7f5e
-
Filesize
316KB
MD52aa7de52392e19b926eae71c8586e140
SHA11bc600401af8de152f5bfb67361728ffd4169fda
SHA256164325f6ddbe5344e928f9bb66c9ed7fcbbffaa2f90e1f80d0289938a710ec03
SHA512044bce3a94a19000530ac6594376d00f7555f8e388e78a6c84c03351c317fb753b9116815a7e1f1cc538a0e5ab48534a3f0d59b53842037fdde33269a67f7f5e
-
Filesize
11KB
MD561b99ad96e943ccb4429281d694a988a
SHA1791b39e3ffcc45d8843c022f048fb08ee6cada66
SHA2569816d4d80893c78eb35701a0b96d2650e0c571f63dad55ea6f421c7a544cfbdd
SHA512c4302d03593e4aaccb6b59a5e49980da755898e7a99b0b376114b60b6ce45aecfc41c2e18bc9c63ae807b0b3b53beacbb2a797b1580ac3e259e20d106fcb9e78
-
Filesize
11KB
MD561b99ad96e943ccb4429281d694a988a
SHA1791b39e3ffcc45d8843c022f048fb08ee6cada66
SHA2569816d4d80893c78eb35701a0b96d2650e0c571f63dad55ea6f421c7a544cfbdd
SHA512c4302d03593e4aaccb6b59a5e49980da755898e7a99b0b376114b60b6ce45aecfc41c2e18bc9c63ae807b0b3b53beacbb2a797b1580ac3e259e20d106fcb9e78
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5