Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 23:08
Static task
static1
Behavioral task
behavioral1
Sample
5e2bb4ad86bd8ca2d39ff74efe6e410b825468be8a7a9c767196ff0a18512cbe.exe
Resource
win10v2004-20230220-en
General
-
Target
5e2bb4ad86bd8ca2d39ff74efe6e410b825468be8a7a9c767196ff0a18512cbe.exe
-
Size
1.5MB
-
MD5
5a69037d0e80eaab91550b38e77e7f04
-
SHA1
f605739a264def722a684e53707add1d6fe5203d
-
SHA256
5e2bb4ad86bd8ca2d39ff74efe6e410b825468be8a7a9c767196ff0a18512cbe
-
SHA512
85958deb6acbb16f381dc8b04bd20dbbe1a6aebb29b8771ff5496bd1a618bf63173b207ed02c508adf8bf6a5a3b46667670edc67d44cb430b3ec8a02ddb40185
-
SSDEEP
24576:RytljDhRVdS65/sOFjz6REFjuf4tMe5rp2RfGswZ+27x0PZ6y3/iOw/:Et5nT5kSzSOCQtnrp2RfGs5hx6y3/iO
Malware Config
Extracted
redline
maxbi
185.161.248.73:4164
-
auth_value
6aa7dba884fe45693dfa04c91440daef
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a27754883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a27754883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g41119919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g41119919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a27754883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a27754883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a27754883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a27754883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g41119919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g41119919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g41119919.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation c91352916.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation d38075111.exe -
Executes dropped EXE 13 IoCs
pid Process 4216 i10790644.exe 1708 i56798059.exe 2216 i94718441.exe 1832 i88061270.exe 4020 a27754883.exe 4968 b74087507.exe 3788 c91352916.exe 4628 oneetx.exe 4624 d38075111.exe 4292 f41861426.exe 1792 g41119919.exe 2220 oneetx.exe 1304 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1780 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a27754883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a27754883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g41119919.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i94718441.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i94718441.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i88061270.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5e2bb4ad86bd8ca2d39ff74efe6e410b825468be8a7a9c767196ff0a18512cbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5e2bb4ad86bd8ca2d39ff74efe6e410b825468be8a7a9c767196ff0a18512cbe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i10790644.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i10790644.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i56798059.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i56798059.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i88061270.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 32 IoCs
pid pid_target Process procid_target 4488 4020 WerFault.exe 88 2368 3788 WerFault.exe 96 916 3788 WerFault.exe 96 2192 3788 WerFault.exe 96 2140 3788 WerFault.exe 96 4880 3788 WerFault.exe 96 2300 3788 WerFault.exe 96 4040 3788 WerFault.exe 96 3776 3788 WerFault.exe 96 3912 3788 WerFault.exe 96 4616 3788 WerFault.exe 96 2220 4628 WerFault.exe 116 2344 4628 WerFault.exe 116 3852 4624 WerFault.exe 119 3864 4628 WerFault.exe 116 4912 4628 WerFault.exe 116 3508 4628 WerFault.exe 116 2224 4628 WerFault.exe 116 3156 4628 WerFault.exe 116 3808 4628 WerFault.exe 116 4668 4628 WerFault.exe 116 2496 4628 WerFault.exe 116 3948 4628 WerFault.exe 116 3080 4628 WerFault.exe 116 4388 4628 WerFault.exe 116 372 4628 WerFault.exe 116 4860 4628 WerFault.exe 116 4984 2220 WerFault.exe 168 2044 4628 WerFault.exe 116 4496 4628 WerFault.exe 116 4864 4628 WerFault.exe 116 4020 1304 WerFault.exe 178 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3784 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4020 a27754883.exe 4020 a27754883.exe 4968 b74087507.exe 4968 b74087507.exe 1792 g41119919.exe 1792 g41119919.exe 1488 1.exe 1488 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4020 a27754883.exe Token: SeDebugPrivilege 4968 b74087507.exe Token: SeDebugPrivilege 1792 g41119919.exe Token: SeDebugPrivilege 1488 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3788 c91352916.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1964 wrote to memory of 4216 1964 5e2bb4ad86bd8ca2d39ff74efe6e410b825468be8a7a9c767196ff0a18512cbe.exe 84 PID 1964 wrote to memory of 4216 1964 5e2bb4ad86bd8ca2d39ff74efe6e410b825468be8a7a9c767196ff0a18512cbe.exe 84 PID 1964 wrote to memory of 4216 1964 5e2bb4ad86bd8ca2d39ff74efe6e410b825468be8a7a9c767196ff0a18512cbe.exe 84 PID 4216 wrote to memory of 1708 4216 i10790644.exe 85 PID 4216 wrote to memory of 1708 4216 i10790644.exe 85 PID 4216 wrote to memory of 1708 4216 i10790644.exe 85 PID 1708 wrote to memory of 2216 1708 i56798059.exe 86 PID 1708 wrote to memory of 2216 1708 i56798059.exe 86 PID 1708 wrote to memory of 2216 1708 i56798059.exe 86 PID 2216 wrote to memory of 1832 2216 i94718441.exe 87 PID 2216 wrote to memory of 1832 2216 i94718441.exe 87 PID 2216 wrote to memory of 1832 2216 i94718441.exe 87 PID 1832 wrote to memory of 4020 1832 i88061270.exe 88 PID 1832 wrote to memory of 4020 1832 i88061270.exe 88 PID 1832 wrote to memory of 4020 1832 i88061270.exe 88 PID 1832 wrote to memory of 4968 1832 i88061270.exe 94 PID 1832 wrote to memory of 4968 1832 i88061270.exe 94 PID 1832 wrote to memory of 4968 1832 i88061270.exe 94 PID 2216 wrote to memory of 3788 2216 i94718441.exe 96 PID 2216 wrote to memory of 3788 2216 i94718441.exe 96 PID 2216 wrote to memory of 3788 2216 i94718441.exe 96 PID 3788 wrote to memory of 4628 3788 c91352916.exe 116 PID 3788 wrote to memory of 4628 3788 c91352916.exe 116 PID 3788 wrote to memory of 4628 3788 c91352916.exe 116 PID 1708 wrote to memory of 4624 1708 i56798059.exe 119 PID 1708 wrote to memory of 4624 1708 i56798059.exe 119 PID 1708 wrote to memory of 4624 1708 i56798059.exe 119 PID 4216 wrote to memory of 4292 4216 i10790644.exe 131 PID 4216 wrote to memory of 4292 4216 i10790644.exe 131 PID 4216 wrote to memory of 4292 4216 i10790644.exe 131 PID 1964 wrote to memory of 1792 1964 5e2bb4ad86bd8ca2d39ff74efe6e410b825468be8a7a9c767196ff0a18512cbe.exe 133 PID 1964 wrote to memory of 1792 1964 5e2bb4ad86bd8ca2d39ff74efe6e410b825468be8a7a9c767196ff0a18512cbe.exe 133 PID 1964 wrote to memory of 1792 1964 5e2bb4ad86bd8ca2d39ff74efe6e410b825468be8a7a9c767196ff0a18512cbe.exe 133 PID 4628 wrote to memory of 3784 4628 oneetx.exe 142 PID 4628 wrote to memory of 3784 4628 oneetx.exe 142 PID 4628 wrote to memory of 3784 4628 oneetx.exe 142 PID 4628 wrote to memory of 2192 4628 oneetx.exe 148 PID 4628 wrote to memory of 2192 4628 oneetx.exe 148 PID 4628 wrote to memory of 2192 4628 oneetx.exe 148 PID 2192 wrote to memory of 924 2192 cmd.exe 152 PID 2192 wrote to memory of 924 2192 cmd.exe 152 PID 2192 wrote to memory of 924 2192 cmd.exe 152 PID 2192 wrote to memory of 2304 2192 cmd.exe 153 PID 2192 wrote to memory of 2304 2192 cmd.exe 153 PID 2192 wrote to memory of 2304 2192 cmd.exe 153 PID 2192 wrote to memory of 4880 2192 cmd.exe 154 PID 2192 wrote to memory of 4880 2192 cmd.exe 154 PID 2192 wrote to memory of 4880 2192 cmd.exe 154 PID 2192 wrote to memory of 420 2192 cmd.exe 155 PID 2192 wrote to memory of 420 2192 cmd.exe 155 PID 2192 wrote to memory of 420 2192 cmd.exe 155 PID 2192 wrote to memory of 3676 2192 cmd.exe 156 PID 2192 wrote to memory of 3676 2192 cmd.exe 156 PID 2192 wrote to memory of 3676 2192 cmd.exe 156 PID 2192 wrote to memory of 4568 2192 cmd.exe 157 PID 2192 wrote to memory of 4568 2192 cmd.exe 157 PID 2192 wrote to memory of 4568 2192 cmd.exe 157 PID 4628 wrote to memory of 1780 4628 oneetx.exe 173 PID 4628 wrote to memory of 1780 4628 oneetx.exe 173 PID 4628 wrote to memory of 1780 4628 oneetx.exe 173
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e2bb4ad86bd8ca2d39ff74efe6e410b825468be8a7a9c767196ff0a18512cbe.exe"C:\Users\Admin\AppData\Local\Temp\5e2bb4ad86bd8ca2d39ff74efe6e410b825468be8a7a9c767196ff0a18512cbe.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i10790644.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i10790644.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i56798059.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i56798059.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i94718441.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i94718441.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i88061270.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i88061270.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a27754883.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a27754883.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 10807⤵
- Program crash
PID:4488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b74087507.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b74087507.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c91352916.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c91352916.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 6966⤵
- Program crash
PID:2368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 7806⤵
- Program crash
PID:916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 8006⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 8086⤵
- Program crash
PID:2140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 9886⤵
- Program crash
PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 9926⤵
- Program crash
PID:2300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 12126⤵
- Program crash
PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 12486⤵
- Program crash
PID:3776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 13206⤵
- Program crash
PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 6927⤵
- Program crash
PID:2220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 8487⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 9887⤵
- Program crash
PID:3864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 9967⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 10967⤵
- Program crash
PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 8607⤵
- Program crash
PID:2224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 11127⤵
- Program crash
PID:3156
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:3784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 7727⤵
- Program crash
PID:3808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 7527⤵
- Program crash
PID:4668
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:2304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:4880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:420
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"8⤵PID:3676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E8⤵PID:4568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 12647⤵
- Program crash
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 12527⤵
- Program crash
PID:3948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 9087⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 13007⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 14127⤵
- Program crash
PID:372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 11327⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 15807⤵
- Program crash
PID:2044
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 10967⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 16327⤵
- Program crash
PID:4864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 13606⤵
- Program crash
PID:4616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d38075111.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d38075111.exe4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4624 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 11885⤵
- Program crash
PID:3852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f41861426.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f41861426.exe3⤵
- Executes dropped EXE
PID:4292
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g41119919.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g41119919.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4020 -ip 40201⤵PID:2276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3788 -ip 37881⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3788 -ip 37881⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3788 -ip 37881⤵PID:4764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3788 -ip 37881⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3788 -ip 37881⤵PID:4740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3788 -ip 37881⤵PID:420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3788 -ip 37881⤵PID:1660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3788 -ip 37881⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3788 -ip 37881⤵PID:2144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3788 -ip 37881⤵PID:1392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4628 -ip 46281⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4628 -ip 46281⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4624 -ip 46241⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4628 -ip 46281⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4628 -ip 46281⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4628 -ip 46281⤵PID:472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4628 -ip 46281⤵PID:4428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4628 -ip 46281⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4628 -ip 46281⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4628 -ip 46281⤵PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4628 -ip 46281⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4628 -ip 46281⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4628 -ip 46281⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4628 -ip 46281⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4628 -ip 46281⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4628 -ip 46281⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 3162⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2220 -ip 22201⤵PID:348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4628 -ip 46281⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4628 -ip 46281⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4628 -ip 46281⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 3162⤵
- Program crash
PID:4020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1304 -ip 13041⤵PID:3632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5ad8fa4206c02b6238ce6aaa297574e73
SHA14df8902a30329b5005305e3b5880828f3f4086ba
SHA25642cb35ca564270a95e4d426215a0a4070e9051cd89656ebdc02da6f43345945b
SHA5125217c8d49b073163b1d565567b3e491574d7508d4764abcc0fa558136c6777ec45239d3fd91d083b08a47f1e22d414d19ef087bc526a6e7cf15d28699e84249f
-
Filesize
176KB
MD5ad8fa4206c02b6238ce6aaa297574e73
SHA14df8902a30329b5005305e3b5880828f3f4086ba
SHA25642cb35ca564270a95e4d426215a0a4070e9051cd89656ebdc02da6f43345945b
SHA5125217c8d49b073163b1d565567b3e491574d7508d4764abcc0fa558136c6777ec45239d3fd91d083b08a47f1e22d414d19ef087bc526a6e7cf15d28699e84249f
-
Filesize
1.3MB
MD517d7f73579cb34b537e1a60c745143ef
SHA1595e574b4ff647e5f95f849e54a8a1255c913562
SHA2562ddd2bd3ca18973c669e2e8eaaa5abca5171adbec985aae50bca1dbc2b1f7ff4
SHA5124abc8f519849b3b4fdd2ac9277aec6a9059236ab2197d62252796d9271fd51950a9d3db51bf763d14b0c3f41c3dfd80fe902561066567709039da540d890d08c
-
Filesize
1.3MB
MD517d7f73579cb34b537e1a60c745143ef
SHA1595e574b4ff647e5f95f849e54a8a1255c913562
SHA2562ddd2bd3ca18973c669e2e8eaaa5abca5171adbec985aae50bca1dbc2b1f7ff4
SHA5124abc8f519849b3b4fdd2ac9277aec6a9059236ab2197d62252796d9271fd51950a9d3db51bf763d14b0c3f41c3dfd80fe902561066567709039da540d890d08c
-
Filesize
207KB
MD55a1aacc77afde3b16f1af536f44dbab7
SHA1406a4018750e89b10da2babac4043ca268c8d472
SHA256cca6002182e19711d38b8670cd7e941637043f6f6bc04641b7dcb31359d2832a
SHA512d9d6196507e08fe9be39a4f41728667756ad29969caa9ca646c77a3ab0b8f18321a18ae94b321d0fc08151e6af34a59fd06ab7e40c2256fb47cacc511cf865a4
-
Filesize
207KB
MD55a1aacc77afde3b16f1af536f44dbab7
SHA1406a4018750e89b10da2babac4043ca268c8d472
SHA256cca6002182e19711d38b8670cd7e941637043f6f6bc04641b7dcb31359d2832a
SHA512d9d6196507e08fe9be39a4f41728667756ad29969caa9ca646c77a3ab0b8f18321a18ae94b321d0fc08151e6af34a59fd06ab7e40c2256fb47cacc511cf865a4
-
Filesize
1.1MB
MD558a846791ab7fe9cc2fce0cf1dd7de0a
SHA15142e98bde4ed39bcfb32aa641cfe6df8bc59e1d
SHA256726b6f9f0b96ae9f650b7bced7f8a8fa7eb02c29c307728d2740e5b580cad26c
SHA5127910b1a5d313a044d5d1ae6067435317c0d8412a3e02b713553949c92802c6f4c2d2208b60c5d84d8efe4b55b2fd81967ae964efd6786cd1d4137e7b4a976461
-
Filesize
1.1MB
MD558a846791ab7fe9cc2fce0cf1dd7de0a
SHA15142e98bde4ed39bcfb32aa641cfe6df8bc59e1d
SHA256726b6f9f0b96ae9f650b7bced7f8a8fa7eb02c29c307728d2740e5b580cad26c
SHA5127910b1a5d313a044d5d1ae6067435317c0d8412a3e02b713553949c92802c6f4c2d2208b60c5d84d8efe4b55b2fd81967ae964efd6786cd1d4137e7b4a976461
-
Filesize
530KB
MD5b607fdef8dc65b9efd00be64fcf31fcd
SHA1d8dda4f006ae611a0fc45df007bfab0fa4ec8fcf
SHA2563b984d5f6b4e4ee38173bc1c6567d6bfd15055e65569b9178ebe9e957151ed8c
SHA512e8372d0e231d689e48b3abbecd6c5b203e85d42d31d6481d53a839279e074f997d67f7bd07c16f29ba23561fc4a66faef53c6f807313946a9d093c8b4100ecaa
-
Filesize
683KB
MD533def079178e6c248b68eb96f1293388
SHA11839bd92ee9aa246df9c3009caac7cb9c8add215
SHA2566f51b5b4d17c531845542a48dd15380be1ddf099b095126e1de41f0eaf782d26
SHA512ac29e2932c887cf5880ec3be2b7a1b3123c44edeaf64ece3fc43b6c9ecde2b49de9accc968f0eb6dd96e4b2bed7bd64ac577e18cf3291d8d6ee0564d619cb153
-
Filesize
683KB
MD533def079178e6c248b68eb96f1293388
SHA11839bd92ee9aa246df9c3009caac7cb9c8add215
SHA2566f51b5b4d17c531845542a48dd15380be1ddf099b095126e1de41f0eaf782d26
SHA512ac29e2932c887cf5880ec3be2b7a1b3123c44edeaf64ece3fc43b6c9ecde2b49de9accc968f0eb6dd96e4b2bed7bd64ac577e18cf3291d8d6ee0564d619cb153
-
Filesize
323KB
MD58730dfe8196edbdded5a81906909d616
SHA1ee37fd09dee1dabb61f0d655f4cf23d53498d117
SHA256fb5106c51a9d1448d9524dd1a9ed40b42d1ba98134fd0fea552dcda8f71215c9
SHA512f88285ef707e3bdb43358c7be1fdd1f22c218a707ae6cc8f3fb63971090bcac7bdebd56e777e65cf36c3f31655eeb00c717e9906ed98f6ae19b0ed651e66e7fe
-
Filesize
323KB
MD58730dfe8196edbdded5a81906909d616
SHA1ee37fd09dee1dabb61f0d655f4cf23d53498d117
SHA256fb5106c51a9d1448d9524dd1a9ed40b42d1ba98134fd0fea552dcda8f71215c9
SHA512f88285ef707e3bdb43358c7be1fdd1f22c218a707ae6cc8f3fb63971090bcac7bdebd56e777e65cf36c3f31655eeb00c717e9906ed98f6ae19b0ed651e66e7fe
-
Filesize
404KB
MD57161aa60c40f749c8fac96cb033e4354
SHA12cdc5b5dd140ade94aac495cc684e1edfa557bc9
SHA256fb50bea694226c5d49144aaec3aa5f10cbe891f98691a15f25fbf7082f1416d6
SHA5122f5bb6393ef9a9bbb3d95e7001292033521cbfc07c32de4aa03b3e07d116a8edd4acfa9a9061060f0fa5cbc9d68662882477405cf9de18769e158f76efb8003e
-
Filesize
404KB
MD57161aa60c40f749c8fac96cb033e4354
SHA12cdc5b5dd140ade94aac495cc684e1edfa557bc9
SHA256fb50bea694226c5d49144aaec3aa5f10cbe891f98691a15f25fbf7082f1416d6
SHA5122f5bb6393ef9a9bbb3d95e7001292033521cbfc07c32de4aa03b3e07d116a8edd4acfa9a9061060f0fa5cbc9d68662882477405cf9de18769e158f76efb8003e
-
Filesize
344KB
MD59938d6d7f50812b5bb85e18eb74226d0
SHA11327f3720a690e0becba1118b44a18f31d53fdc0
SHA256800c9f5f8fbc0e27be1e1ff5b06200bb3614ef916c40e44a81c1a2e1a6a7ef17
SHA5122cb40a1a52c72ed2bc829e95f5d1b9c9c125912ca895c6cd8e2d9113285533b2825cc5195ad1ac76dd9ea38dd4910411eb0d23c3ec2ccfe20ae564d6fa1bdf54
-
Filesize
344KB
MD59938d6d7f50812b5bb85e18eb74226d0
SHA11327f3720a690e0becba1118b44a18f31d53fdc0
SHA256800c9f5f8fbc0e27be1e1ff5b06200bb3614ef916c40e44a81c1a2e1a6a7ef17
SHA5122cb40a1a52c72ed2bc829e95f5d1b9c9c125912ca895c6cd8e2d9113285533b2825cc5195ad1ac76dd9ea38dd4910411eb0d23c3ec2ccfe20ae564d6fa1bdf54
-
Filesize
168KB
MD5312a33adbc8311f0e125557f5c059395
SHA1613486a8d092709cf2c0dc76170ad4092858306f
SHA2561944cb44096a8683cbd2b1d6bea123e514d16d96bceaef2c89e937a0cee1fb41
SHA512dfde61d219578e279a0708be1b339df7eef5ffe8ad048b13790dc246e137f2acb54de8ec9bb98b3413e68f3a65857c0c319e3ee134050a14d9cb803362697a5a
-
Filesize
168KB
MD5312a33adbc8311f0e125557f5c059395
SHA1613486a8d092709cf2c0dc76170ad4092858306f
SHA2561944cb44096a8683cbd2b1d6bea123e514d16d96bceaef2c89e937a0cee1fb41
SHA512dfde61d219578e279a0708be1b339df7eef5ffe8ad048b13790dc246e137f2acb54de8ec9bb98b3413e68f3a65857c0c319e3ee134050a14d9cb803362697a5a
-
Filesize
323KB
MD58730dfe8196edbdded5a81906909d616
SHA1ee37fd09dee1dabb61f0d655f4cf23d53498d117
SHA256fb5106c51a9d1448d9524dd1a9ed40b42d1ba98134fd0fea552dcda8f71215c9
SHA512f88285ef707e3bdb43358c7be1fdd1f22c218a707ae6cc8f3fb63971090bcac7bdebd56e777e65cf36c3f31655eeb00c717e9906ed98f6ae19b0ed651e66e7fe
-
Filesize
323KB
MD58730dfe8196edbdded5a81906909d616
SHA1ee37fd09dee1dabb61f0d655f4cf23d53498d117
SHA256fb5106c51a9d1448d9524dd1a9ed40b42d1ba98134fd0fea552dcda8f71215c9
SHA512f88285ef707e3bdb43358c7be1fdd1f22c218a707ae6cc8f3fb63971090bcac7bdebd56e777e65cf36c3f31655eeb00c717e9906ed98f6ae19b0ed651e66e7fe
-
Filesize
323KB
MD58730dfe8196edbdded5a81906909d616
SHA1ee37fd09dee1dabb61f0d655f4cf23d53498d117
SHA256fb5106c51a9d1448d9524dd1a9ed40b42d1ba98134fd0fea552dcda8f71215c9
SHA512f88285ef707e3bdb43358c7be1fdd1f22c218a707ae6cc8f3fb63971090bcac7bdebd56e777e65cf36c3f31655eeb00c717e9906ed98f6ae19b0ed651e66e7fe
-
Filesize
323KB
MD58730dfe8196edbdded5a81906909d616
SHA1ee37fd09dee1dabb61f0d655f4cf23d53498d117
SHA256fb5106c51a9d1448d9524dd1a9ed40b42d1ba98134fd0fea552dcda8f71215c9
SHA512f88285ef707e3bdb43358c7be1fdd1f22c218a707ae6cc8f3fb63971090bcac7bdebd56e777e65cf36c3f31655eeb00c717e9906ed98f6ae19b0ed651e66e7fe
-
Filesize
323KB
MD58730dfe8196edbdded5a81906909d616
SHA1ee37fd09dee1dabb61f0d655f4cf23d53498d117
SHA256fb5106c51a9d1448d9524dd1a9ed40b42d1ba98134fd0fea552dcda8f71215c9
SHA512f88285ef707e3bdb43358c7be1fdd1f22c218a707ae6cc8f3fb63971090bcac7bdebd56e777e65cf36c3f31655eeb00c717e9906ed98f6ae19b0ed651e66e7fe
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5