Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 21:22
Static task
static1
General
-
Target
4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c.exe
-
Size
1.0MB
-
MD5
11536a4523ae232d3c88ca63e1dfdd8f
-
SHA1
ecf154fbc8a35a45535e723e57638fbd2bc50e26
-
SHA256
4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c
-
SHA512
034aac34b5b947965af2b50e24bc3592689d4e186fc3a6412e92b4896cce89a3f3e8c98b8316e8c73389faf79d848054ab8b3a3a6299cf7925296b91e2186237
-
SSDEEP
24576:wy45ZEG20xj4vV3ACAWe1C0w0Hxlxftg+ys:38XOV3beNHxlxVHy
Malware Config
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
brat
176.113.115.145:4125
-
auth_value
1f9c658aed2f70f42f99a57a005561cf
Signatures
-
Processes:
cor1043.exeaz305729.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor1043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor1043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az305729.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor1043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor1043.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az305729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az305729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az305729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az305729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az305729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor1043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor1043.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3400-235-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-240-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-237-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-242-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-244-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-246-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-248-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-250-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-252-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-254-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-256-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-258-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-260-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-262-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-264-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-266-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/3400-268-0x0000000002400000-0x000000000243F000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bu270130.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation bu270130.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 12 IoCs
Processes:
kina7950.exekina0336.exekina1830.exeaz305729.exebu270130.exeoneetx.execor1043.exeoneetx.exedqH77s24.exeen220175.exeoneetx.exeoneetx.exepid process 4796 kina7950.exe 2724 kina0336.exe 2456 kina1830.exe 1636 az305729.exe 4120 bu270130.exe 3952 oneetx.exe 5008 cor1043.exe 1572 oneetx.exe 3400 dqH77s24.exe 3184 en220175.exe 3920 oneetx.exe 3532 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4388 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
az305729.execor1043.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az305729.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor1043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor1043.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
kina0336.exekina1830.exe4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c.exekina7950.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina0336.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina1830.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina1830.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina7950.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina7950.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina0336.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4616 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4980 4120 WerFault.exe bu270130.exe 2232 4120 WerFault.exe bu270130.exe 5080 4120 WerFault.exe bu270130.exe 1568 4120 WerFault.exe bu270130.exe 2376 4120 WerFault.exe bu270130.exe 3084 4120 WerFault.exe bu270130.exe 844 4120 WerFault.exe bu270130.exe 4712 4120 WerFault.exe bu270130.exe 4676 4120 WerFault.exe bu270130.exe 3512 4120 WerFault.exe bu270130.exe 2320 3952 WerFault.exe oneetx.exe 2924 3952 WerFault.exe oneetx.exe 2692 3952 WerFault.exe oneetx.exe 4400 3952 WerFault.exe oneetx.exe 3932 3952 WerFault.exe oneetx.exe 1688 3952 WerFault.exe oneetx.exe 3516 3952 WerFault.exe oneetx.exe 316 3952 WerFault.exe oneetx.exe 212 3952 WerFault.exe oneetx.exe 4996 3952 WerFault.exe oneetx.exe 1660 3952 WerFault.exe oneetx.exe 3904 5008 WerFault.exe cor1043.exe 3372 1572 WerFault.exe oneetx.exe 4668 3400 WerFault.exe dqH77s24.exe 3828 3952 WerFault.exe oneetx.exe 1828 3952 WerFault.exe oneetx.exe 3148 3952 WerFault.exe oneetx.exe 2808 3920 WerFault.exe oneetx.exe 1640 3952 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
az305729.execor1043.exedqH77s24.exeen220175.exepid process 1636 az305729.exe 1636 az305729.exe 5008 cor1043.exe 5008 cor1043.exe 3400 dqH77s24.exe 3400 dqH77s24.exe 3184 en220175.exe 3184 en220175.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
az305729.execor1043.exedqH77s24.exeen220175.exedescription pid process Token: SeDebugPrivilege 1636 az305729.exe Token: SeDebugPrivilege 5008 cor1043.exe Token: SeDebugPrivilege 3400 dqH77s24.exe Token: SeDebugPrivilege 3184 en220175.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
bu270130.exepid process 4120 bu270130.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c.exekina7950.exekina0336.exekina1830.exebu270130.exeoneetx.exedescription pid process target process PID 4680 wrote to memory of 4796 4680 4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c.exe kina7950.exe PID 4680 wrote to memory of 4796 4680 4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c.exe kina7950.exe PID 4680 wrote to memory of 4796 4680 4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c.exe kina7950.exe PID 4796 wrote to memory of 2724 4796 kina7950.exe kina0336.exe PID 4796 wrote to memory of 2724 4796 kina7950.exe kina0336.exe PID 4796 wrote to memory of 2724 4796 kina7950.exe kina0336.exe PID 2724 wrote to memory of 2456 2724 kina0336.exe kina1830.exe PID 2724 wrote to memory of 2456 2724 kina0336.exe kina1830.exe PID 2724 wrote to memory of 2456 2724 kina0336.exe kina1830.exe PID 2456 wrote to memory of 1636 2456 kina1830.exe az305729.exe PID 2456 wrote to memory of 1636 2456 kina1830.exe az305729.exe PID 2456 wrote to memory of 4120 2456 kina1830.exe bu270130.exe PID 2456 wrote to memory of 4120 2456 kina1830.exe bu270130.exe PID 2456 wrote to memory of 4120 2456 kina1830.exe bu270130.exe PID 4120 wrote to memory of 3952 4120 bu270130.exe oneetx.exe PID 4120 wrote to memory of 3952 4120 bu270130.exe oneetx.exe PID 4120 wrote to memory of 3952 4120 bu270130.exe oneetx.exe PID 2724 wrote to memory of 5008 2724 kina0336.exe cor1043.exe PID 2724 wrote to memory of 5008 2724 kina0336.exe cor1043.exe PID 2724 wrote to memory of 5008 2724 kina0336.exe cor1043.exe PID 3952 wrote to memory of 432 3952 oneetx.exe schtasks.exe PID 3952 wrote to memory of 432 3952 oneetx.exe schtasks.exe PID 3952 wrote to memory of 432 3952 oneetx.exe schtasks.exe PID 4796 wrote to memory of 3400 4796 kina7950.exe dqH77s24.exe PID 4796 wrote to memory of 3400 4796 kina7950.exe dqH77s24.exe PID 4796 wrote to memory of 3400 4796 kina7950.exe dqH77s24.exe PID 4680 wrote to memory of 3184 4680 4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c.exe en220175.exe PID 4680 wrote to memory of 3184 4680 4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c.exe en220175.exe PID 4680 wrote to memory of 3184 4680 4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c.exe en220175.exe PID 3952 wrote to memory of 4388 3952 oneetx.exe rundll32.exe PID 3952 wrote to memory of 4388 3952 oneetx.exe rundll32.exe PID 3952 wrote to memory of 4388 3952 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c.exe"C:\Users\Admin\AppData\Local\Temp\4f88a386ee9fc5d72532aba72ab33659c42917a58ec29d9ba13044f1b708ba3c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7950.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7950.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0336.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0336.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1830.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1830.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az305729.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az305729.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu270130.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu270130.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 6966⤵
- Program crash
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 7806⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 7966⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 9726⤵
- Program crash
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 9886⤵
- Program crash
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 9886⤵
- Program crash
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 12166⤵
- Program crash
PID:844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 12446⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 13126⤵
- Program crash
PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 6967⤵
- Program crash
PID:2320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 9007⤵
- Program crash
PID:2924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 9087⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 10807⤵
- Program crash
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 9087⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 9087⤵
- Program crash
PID:1688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 11287⤵
- Program crash
PID:3516
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 10207⤵
- Program crash
PID:316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 6887⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 6327⤵
- Program crash
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 7647⤵
- Program crash
PID:1660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 11487⤵
- Program crash
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 16087⤵
- Program crash
PID:1828
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 11487⤵
- Program crash
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 16247⤵
- Program crash
PID:1640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 7886⤵
- Program crash
PID:3512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor1043.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor1043.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 10045⤵
- Program crash
PID:3904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dqH77s24.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dqH77s24.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 17164⤵
- Program crash
PID:4668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en220175.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en220175.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 4120 -ip 41201⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4120 -ip 41201⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4120 -ip 41201⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4120 -ip 41201⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4120 -ip 41201⤵PID:3212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4120 -ip 41201⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4120 -ip 41201⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4120 -ip 41201⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4120 -ip 41201⤵PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4120 -ip 41201⤵PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3952 -ip 39521⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3952 -ip 39521⤵PID:1664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3952 -ip 39521⤵PID:4968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3952 -ip 39521⤵PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3952 -ip 39521⤵PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3952 -ip 39521⤵PID:3140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3952 -ip 39521⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3952 -ip 39521⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3952 -ip 39521⤵PID:2584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3952 -ip 39521⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3952 -ip 39521⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 3122⤵
- Program crash
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 5008 -ip 50081⤵PID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1572 -ip 15721⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3400 -ip 34001⤵PID:4340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3952 -ip 39521⤵PID:2548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3952 -ip 39521⤵PID:1772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3952 -ip 39521⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 3202⤵
- Program crash
PID:2808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3920 -ip 39201⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3952 -ip 39521⤵PID:4316
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4616
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
168KB
MD50926bd337be5f6b545c9f102ea3edc82
SHA1087cda2081fe76d6b27ff105c6107c2563de974e
SHA256e971e657a4e87ce5caae0ce4d6ecb1c987de437f514a419b51e56ad65908ecc4
SHA5122ab596d8f54f118be9115b012a0326b508b22b3df4fede27de3251d70cfd414da0ec8732a81f1f467b94c5a1f18befa49d84905b582f4629ce29dc3db7d9a0f0
-
Filesize
168KB
MD50926bd337be5f6b545c9f102ea3edc82
SHA1087cda2081fe76d6b27ff105c6107c2563de974e
SHA256e971e657a4e87ce5caae0ce4d6ecb1c987de437f514a419b51e56ad65908ecc4
SHA5122ab596d8f54f118be9115b012a0326b508b22b3df4fede27de3251d70cfd414da0ec8732a81f1f467b94c5a1f18befa49d84905b582f4629ce29dc3db7d9a0f0
-
Filesize
921KB
MD556279e9e4a73198baac192ee9d1c656d
SHA16583235f3b9990f00a0f4ac88b547c9c72fe7b8b
SHA256a3a6b8d05291a877e943e51fbcf730249617e72df1d2d19e83603d19b55913d4
SHA512b8e1496a549259c1f6ab70dac963de73431582c292fb0e860a44a3267bd369ec14ab6997ee0b16f3daa5114a3e862993e893051ff3605610e64034f66bce962a
-
Filesize
921KB
MD556279e9e4a73198baac192ee9d1c656d
SHA16583235f3b9990f00a0f4ac88b547c9c72fe7b8b
SHA256a3a6b8d05291a877e943e51fbcf730249617e72df1d2d19e83603d19b55913d4
SHA512b8e1496a549259c1f6ab70dac963de73431582c292fb0e860a44a3267bd369ec14ab6997ee0b16f3daa5114a3e862993e893051ff3605610e64034f66bce962a
-
Filesize
297KB
MD512c9018dade137b6d911dbe9e99bd9f1
SHA1f9e055919c9ada8b1e2b5fd3421be62aaf955dea
SHA25617fd9823a9bc8dbd7ae6aab162b289aac444b372e63a64bc26e50185ea1376d6
SHA5121bcf60a6203c2994c2a9da14327180e3594b0df5e91bd49aa880a695d3192f5b1a3ba62c30019f9316a348b5f45030fe87219ea40707365eac8de8e5f641db09
-
Filesize
297KB
MD512c9018dade137b6d911dbe9e99bd9f1
SHA1f9e055919c9ada8b1e2b5fd3421be62aaf955dea
SHA25617fd9823a9bc8dbd7ae6aab162b289aac444b372e63a64bc26e50185ea1376d6
SHA5121bcf60a6203c2994c2a9da14327180e3594b0df5e91bd49aa880a695d3192f5b1a3ba62c30019f9316a348b5f45030fe87219ea40707365eac8de8e5f641db09
-
Filesize
589KB
MD5af03bb9c086a0a6cb4372143005ce0a5
SHA19d8734e7ad4797d4d3de54eb607aeb4a72aacc54
SHA25601946d374e3d5d8e8982a463d0f49cb97d03ed7b8ddb183447d7cfe44faef9c1
SHA5120d035b6e2e64470837ac844a8e1303465db246e386af83bb47e6e0153e69a4a58a32c73e6058123caa327767950301aec12ea2a16a2b7116a6ded9e91be5b8d6
-
Filesize
589KB
MD5af03bb9c086a0a6cb4372143005ce0a5
SHA19d8734e7ad4797d4d3de54eb607aeb4a72aacc54
SHA25601946d374e3d5d8e8982a463d0f49cb97d03ed7b8ddb183447d7cfe44faef9c1
SHA5120d035b6e2e64470837ac844a8e1303465db246e386af83bb47e6e0153e69a4a58a32c73e6058123caa327767950301aec12ea2a16a2b7116a6ded9e91be5b8d6
-
Filesize
239KB
MD5a45f8bc303dfe49c45692083a9787b38
SHA1dc9068205a4ef3aef9813fff40e550e5f9a342ac
SHA256bfbc3738c5f0d42b3a593a5be2048c5de63cf7bee3960c1cbb254b6c81306e43
SHA5129cd1fae09eb381a8624932eebb4972894952adada39018e4650f52b1496890cb1fa05e4d31c76e0e3c96529e46a16a945e480676d726d51800cf61ada3dde669
-
Filesize
239KB
MD5a45f8bc303dfe49c45692083a9787b38
SHA1dc9068205a4ef3aef9813fff40e550e5f9a342ac
SHA256bfbc3738c5f0d42b3a593a5be2048c5de63cf7bee3960c1cbb254b6c81306e43
SHA5129cd1fae09eb381a8624932eebb4972894952adada39018e4650f52b1496890cb1fa05e4d31c76e0e3c96529e46a16a945e480676d726d51800cf61ada3dde669
-
Filesize
316KB
MD5fce3245c4953d2df2124da097979adf8
SHA11aa338bd626b19ae478416ad14e665f6976fb1d0
SHA25660460102295612361c3e05ea87588b7f1dad96e2bb5cb0a81a2f481979c7df6d
SHA51284f5ef19e99f4878718e31b90683fa60523f34417bcb63351f43c4b77b70e91674f041c2c965bfa5fae1b86f651a2f65b1816c903bf428d98c132db5ea1ff90a
-
Filesize
316KB
MD5fce3245c4953d2df2124da097979adf8
SHA11aa338bd626b19ae478416ad14e665f6976fb1d0
SHA25660460102295612361c3e05ea87588b7f1dad96e2bb5cb0a81a2f481979c7df6d
SHA51284f5ef19e99f4878718e31b90683fa60523f34417bcb63351f43c4b77b70e91674f041c2c965bfa5fae1b86f651a2f65b1816c903bf428d98c132db5ea1ff90a
-
Filesize
11KB
MD5fda150cbbe59c4a15e60691d25397873
SHA110214422ff569e6b48623d9f73465dab8157d993
SHA25669dbde5c1e79180df44fbbe52a81585cf03b44843610fdff1f0a15fa212046f9
SHA5129a4db3f159a8ba5a950c27edb8b784dafe443561c55c95fbfaf7bf0e120e1dbf1552b5b85025c634d2841ad3e9927394b3072dc5dc2e974bd494e4ff9b38e089
-
Filesize
11KB
MD5fda150cbbe59c4a15e60691d25397873
SHA110214422ff569e6b48623d9f73465dab8157d993
SHA25669dbde5c1e79180df44fbbe52a81585cf03b44843610fdff1f0a15fa212046f9
SHA5129a4db3f159a8ba5a950c27edb8b784dafe443561c55c95fbfaf7bf0e120e1dbf1552b5b85025c634d2841ad3e9927394b3072dc5dc2e974bd494e4ff9b38e089
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5