Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2023, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
cad3084c4152c8d79130ce2b40064451ec32934768bf5b379159fa397d311ab2.exe
Resource
win10v2004-20230220-en
General
-
Target
cad3084c4152c8d79130ce2b40064451ec32934768bf5b379159fa397d311ab2.exe
-
Size
1.5MB
-
MD5
eaeafd61612c79206759197aa1a0ed95
-
SHA1
29a3177fa614cba8f021f681690d20b9c82db20d
-
SHA256
cad3084c4152c8d79130ce2b40064451ec32934768bf5b379159fa397d311ab2
-
SHA512
1a3074a067594fa26743134dbebb7dbe231fdc5116a337865427772a34bb55c652047472bdab78ca3608e1d711b2a5068702528da52b7411dc54f5206f9c5d7a
-
SSDEEP
24576:Ay14RrnADW8An/T2wlXf2vqrEcL1EVth2U3LwXybpx38jG06YoSn8lTxpCqDZlJu:HIrADW7FXP1uh2UUibv38jGD48px0qtL
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0214810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0214810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d5678878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d5678878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d5678878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0214810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0214810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0214810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0214810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d5678878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d5678878.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation c9697255.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation e9809057.exe -
Executes dropped EXE 14 IoCs
pid Process 3768 v6364913.exe 4148 v5459312.exe 4220 v7590425.exe 860 v7286256.exe 1012 a0214810.exe 4608 b1435449.exe 3952 c9697255.exe 1372 oneetx.exe 4676 d5678878.exe 3732 e9809057.exe 3692 1.exe 4632 f5274172.exe 4216 oneetx.exe 4552 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2092 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0214810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0214810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d5678878.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6364913.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5459312.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7590425.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v7590425.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cad3084c4152c8d79130ce2b40064451ec32934768bf5b379159fa397d311ab2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cad3084c4152c8d79130ce2b40064451ec32934768bf5b379159fa397d311ab2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6364913.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5459312.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7286256.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v7286256.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
pid pid_target Process procid_target 1820 1012 WerFault.exe 84 1520 3952 WerFault.exe 94 1428 3952 WerFault.exe 94 724 3952 WerFault.exe 94 2076 3952 WerFault.exe 94 4684 3952 WerFault.exe 94 3188 3952 WerFault.exe 94 452 3952 WerFault.exe 94 3984 3952 WerFault.exe 94 3908 3952 WerFault.exe 94 3972 3952 WerFault.exe 94 3252 1372 WerFault.exe 114 1616 1372 WerFault.exe 114 3552 1372 WerFault.exe 114 396 1372 WerFault.exe 114 4340 1372 WerFault.exe 114 4328 1372 WerFault.exe 114 2452 1372 WerFault.exe 114 4444 1372 WerFault.exe 114 3956 1372 WerFault.exe 114 2576 1372 WerFault.exe 114 800 1372 WerFault.exe 114 3440 1372 WerFault.exe 114 2676 1372 WerFault.exe 114 4936 3732 WerFault.exe 158 528 1372 WerFault.exe 114 3812 4216 WerFault.exe 165 2428 1372 WerFault.exe 114 4920 1372 WerFault.exe 114 2360 1372 WerFault.exe 114 3988 4552 WerFault.exe 175 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4876 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1012 a0214810.exe 1012 a0214810.exe 4608 b1435449.exe 4608 b1435449.exe 4676 d5678878.exe 4676 d5678878.exe 3692 1.exe 3692 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1012 a0214810.exe Token: SeDebugPrivilege 4608 b1435449.exe Token: SeDebugPrivilege 4676 d5678878.exe Token: SeDebugPrivilege 3732 e9809057.exe Token: SeDebugPrivilege 3692 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3952 c9697255.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 828 wrote to memory of 3768 828 cad3084c4152c8d79130ce2b40064451ec32934768bf5b379159fa397d311ab2.exe 80 PID 828 wrote to memory of 3768 828 cad3084c4152c8d79130ce2b40064451ec32934768bf5b379159fa397d311ab2.exe 80 PID 828 wrote to memory of 3768 828 cad3084c4152c8d79130ce2b40064451ec32934768bf5b379159fa397d311ab2.exe 80 PID 3768 wrote to memory of 4148 3768 v6364913.exe 81 PID 3768 wrote to memory of 4148 3768 v6364913.exe 81 PID 3768 wrote to memory of 4148 3768 v6364913.exe 81 PID 4148 wrote to memory of 4220 4148 v5459312.exe 82 PID 4148 wrote to memory of 4220 4148 v5459312.exe 82 PID 4148 wrote to memory of 4220 4148 v5459312.exe 82 PID 4220 wrote to memory of 860 4220 v7590425.exe 83 PID 4220 wrote to memory of 860 4220 v7590425.exe 83 PID 4220 wrote to memory of 860 4220 v7590425.exe 83 PID 860 wrote to memory of 1012 860 v7286256.exe 84 PID 860 wrote to memory of 1012 860 v7286256.exe 84 PID 860 wrote to memory of 1012 860 v7286256.exe 84 PID 860 wrote to memory of 4608 860 v7286256.exe 93 PID 860 wrote to memory of 4608 860 v7286256.exe 93 PID 860 wrote to memory of 4608 860 v7286256.exe 93 PID 4220 wrote to memory of 3952 4220 v7590425.exe 94 PID 4220 wrote to memory of 3952 4220 v7590425.exe 94 PID 4220 wrote to memory of 3952 4220 v7590425.exe 94 PID 3952 wrote to memory of 1372 3952 c9697255.exe 114 PID 3952 wrote to memory of 1372 3952 c9697255.exe 114 PID 3952 wrote to memory of 1372 3952 c9697255.exe 114 PID 4148 wrote to memory of 4676 4148 v5459312.exe 118 PID 4148 wrote to memory of 4676 4148 v5459312.exe 118 PID 4148 wrote to memory of 4676 4148 v5459312.exe 118 PID 1372 wrote to memory of 4876 1372 oneetx.exe 136 PID 1372 wrote to memory of 4876 1372 oneetx.exe 136 PID 1372 wrote to memory of 4876 1372 oneetx.exe 136 PID 1372 wrote to memory of 1736 1372 oneetx.exe 142 PID 1372 wrote to memory of 1736 1372 oneetx.exe 142 PID 1372 wrote to memory of 1736 1372 oneetx.exe 142 PID 1736 wrote to memory of 4832 1736 cmd.exe 146 PID 1736 wrote to memory of 4832 1736 cmd.exe 146 PID 1736 wrote to memory of 4832 1736 cmd.exe 146 PID 1736 wrote to memory of 2260 1736 cmd.exe 147 PID 1736 wrote to memory of 2260 1736 cmd.exe 147 PID 1736 wrote to memory of 2260 1736 cmd.exe 147 PID 1736 wrote to memory of 5048 1736 cmd.exe 148 PID 1736 wrote to memory of 5048 1736 cmd.exe 148 PID 1736 wrote to memory of 5048 1736 cmd.exe 148 PID 1736 wrote to memory of 4160 1736 cmd.exe 149 PID 1736 wrote to memory of 4160 1736 cmd.exe 149 PID 1736 wrote to memory of 4160 1736 cmd.exe 149 PID 1736 wrote to memory of 2624 1736 cmd.exe 150 PID 1736 wrote to memory of 2624 1736 cmd.exe 150 PID 1736 wrote to memory of 2624 1736 cmd.exe 150 PID 1736 wrote to memory of 2620 1736 cmd.exe 151 PID 1736 wrote to memory of 2620 1736 cmd.exe 151 PID 1736 wrote to memory of 2620 1736 cmd.exe 151 PID 3768 wrote to memory of 3732 3768 v6364913.exe 158 PID 3768 wrote to memory of 3732 3768 v6364913.exe 158 PID 3768 wrote to memory of 3732 3768 v6364913.exe 158 PID 3732 wrote to memory of 3692 3732 e9809057.exe 159 PID 3732 wrote to memory of 3692 3732 e9809057.exe 159 PID 3732 wrote to memory of 3692 3732 e9809057.exe 159 PID 828 wrote to memory of 4632 828 cad3084c4152c8d79130ce2b40064451ec32934768bf5b379159fa397d311ab2.exe 162 PID 828 wrote to memory of 4632 828 cad3084c4152c8d79130ce2b40064451ec32934768bf5b379159fa397d311ab2.exe 162 PID 828 wrote to memory of 4632 828 cad3084c4152c8d79130ce2b40064451ec32934768bf5b379159fa397d311ab2.exe 162 PID 1372 wrote to memory of 2092 1372 oneetx.exe 170 PID 1372 wrote to memory of 2092 1372 oneetx.exe 170 PID 1372 wrote to memory of 2092 1372 oneetx.exe 170
Processes
-
C:\Users\Admin\AppData\Local\Temp\cad3084c4152c8d79130ce2b40064451ec32934768bf5b379159fa397d311ab2.exe"C:\Users\Admin\AppData\Local\Temp\cad3084c4152c8d79130ce2b40064451ec32934768bf5b379159fa397d311ab2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6364913.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6364913.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5459312.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5459312.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7590425.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7590425.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7286256.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7286256.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0214810.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0214810.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 10847⤵
- Program crash
PID:1820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1435449.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1435449.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9697255.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9697255.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 6966⤵
- Program crash
PID:1520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 7646⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 8006⤵
- Program crash
PID:724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 9526⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 8006⤵
- Program crash
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 8006⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 12246⤵
- Program crash
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 12566⤵
- Program crash
PID:3984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 13206⤵
- Program crash
PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 6927⤵
- Program crash
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 8447⤵
- Program crash
PID:1616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 9167⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 10527⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 10607⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 10607⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 11087⤵
- Program crash
PID:2452
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 9927⤵
- Program crash
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 7767⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:2260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:5048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4160
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:2624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:2620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 8527⤵
- Program crash
PID:2576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 7647⤵
- Program crash
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 12207⤵
- Program crash
PID:3440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 9167⤵
- Program crash
PID:2676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 11687⤵
- Program crash
PID:528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 15967⤵
- Program crash
PID:2428
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 11287⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 16327⤵
- Program crash
PID:2360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 13766⤵
- Program crash
PID:3972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d5678878.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d5678878.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e9809057.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e9809057.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 2364⤵
- Program crash
PID:4936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f5274172.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f5274172.exe2⤵
- Executes dropped EXE
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1012 -ip 10121⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3952 -ip 39521⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3952 -ip 39521⤵PID:3776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3952 -ip 39521⤵PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3952 -ip 39521⤵PID:376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3952 -ip 39521⤵PID:4196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3952 -ip 39521⤵PID:4224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3952 -ip 39521⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3952 -ip 39521⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3952 -ip 39521⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3952 -ip 39521⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1372 -ip 13721⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1372 -ip 13721⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1372 -ip 13721⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1372 -ip 13721⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1372 -ip 13721⤵PID:796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1372 -ip 13721⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1372 -ip 13721⤵PID:1172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1372 -ip 13721⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1372 -ip 13721⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1372 -ip 13721⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1372 -ip 13721⤵PID:1688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1372 -ip 13721⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1372 -ip 13721⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3732 -ip 37321⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1372 -ip 13721⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 3162⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4216 -ip 42161⤵PID:956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1372 -ip 13721⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1372 -ip 13721⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1372 -ip 13721⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 3202⤵
- Program crash
PID:3988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4552 -ip 45521⤵PID:208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD54d01f194be4c95c125444dc612a4ff8a
SHA15f07bf15d5789d889a6fa4a113a0b2784da2fe4b
SHA256c2aaa5bd1ca745d32dca56f71c7e9ffba8f493fbc02da21666b6861f23e7f817
SHA5125a034d9f672e06c3f12e83d7a6fa76d9045ad9d2401b4ac44c70429a1ac2804362fdd634cb97583e98a45195b6dbc941dce8db9f1fbe96e9be345ad984e8c781
-
Filesize
205KB
MD54d01f194be4c95c125444dc612a4ff8a
SHA15f07bf15d5789d889a6fa4a113a0b2784da2fe4b
SHA256c2aaa5bd1ca745d32dca56f71c7e9ffba8f493fbc02da21666b6861f23e7f817
SHA5125a034d9f672e06c3f12e83d7a6fa76d9045ad9d2401b4ac44c70429a1ac2804362fdd634cb97583e98a45195b6dbc941dce8db9f1fbe96e9be345ad984e8c781
-
Filesize
1.3MB
MD5f668244eef05c654367628df9ab90f76
SHA117692ebfe6dfca665acde0ac7ef9b97925cdc49c
SHA256df004d7eaeb4dc4e8bd1fe9f7c2999ddf0e76fb74e30cab5931303203f4ac773
SHA512794139d6cfe6761129fdf558dd7631cd5e1f715b5792ad6ecc00a29e111908ac6a8fa171e61832e0426785b441be739ee3d99dc908215b151bac52eedf768df6
-
Filesize
1.3MB
MD5f668244eef05c654367628df9ab90f76
SHA117692ebfe6dfca665acde0ac7ef9b97925cdc49c
SHA256df004d7eaeb4dc4e8bd1fe9f7c2999ddf0e76fb74e30cab5931303203f4ac773
SHA512794139d6cfe6761129fdf558dd7631cd5e1f715b5792ad6ecc00a29e111908ac6a8fa171e61832e0426785b441be739ee3d99dc908215b151bac52eedf768df6
-
Filesize
478KB
MD52710b4a5f42d31f2126f9619f3fdb686
SHA191d2b9b33fe3996a0df02c8eb65bf7030f6e89e3
SHA256dbff7da7fa0ea5eba4e3fa918b2c4419f690a2ace7c3cadd8fc088f6cc14bd76
SHA512b29875b3bce0295fbcc8e7c76f7425eac7fdecf91919b186df9e209d27899b8549bc3b87be67bfc762593afe83d9e62a2d9065085658681cf9d6c8791f31e3c3
-
Filesize
478KB
MD52710b4a5f42d31f2126f9619f3fdb686
SHA191d2b9b33fe3996a0df02c8eb65bf7030f6e89e3
SHA256dbff7da7fa0ea5eba4e3fa918b2c4419f690a2ace7c3cadd8fc088f6cc14bd76
SHA512b29875b3bce0295fbcc8e7c76f7425eac7fdecf91919b186df9e209d27899b8549bc3b87be67bfc762593afe83d9e62a2d9065085658681cf9d6c8791f31e3c3
-
Filesize
848KB
MD5837a4cbae03bf81df0c1d96253307a91
SHA19be4bbe4aba15d179b7f1d325387d67f0e7c845f
SHA256db5c1a94bdb065730d071e4c052673ba9bfe235c7ada4fed179f7c6d3eedf365
SHA5120ea459bf88848fedb6119263b2c94b306bbca7463a0c258ed49075d40d3cff34632e403849356c466908785396b99e5da835dda68c2093eac8dd7de37687fa76
-
Filesize
848KB
MD5837a4cbae03bf81df0c1d96253307a91
SHA19be4bbe4aba15d179b7f1d325387d67f0e7c845f
SHA256db5c1a94bdb065730d071e4c052673ba9bfe235c7ada4fed179f7c6d3eedf365
SHA5120ea459bf88848fedb6119263b2c94b306bbca7463a0c258ed49075d40d3cff34632e403849356c466908785396b99e5da835dda68c2093eac8dd7de37687fa76
-
Filesize
177KB
MD5db05b63d3fec8be0ccac22cc10d4e478
SHA19e75ea8ad04b634d03e803bfe882301d43072d63
SHA25644ec3c63801ceb1f7d2d559cd7f1ac61381df732ba5f2947aa88671c0427dabb
SHA5123374b946186b9d0b71f518dad7252c6b5eb67081518463882217d425c1cf5bd56446d015858afcdd738126d8e13c87aa9e6caa8ed7fae39e07e0163d36af740e
-
Filesize
177KB
MD5db05b63d3fec8be0ccac22cc10d4e478
SHA19e75ea8ad04b634d03e803bfe882301d43072d63
SHA25644ec3c63801ceb1f7d2d559cd7f1ac61381df732ba5f2947aa88671c0427dabb
SHA5123374b946186b9d0b71f518dad7252c6b5eb67081518463882217d425c1cf5bd56446d015858afcdd738126d8e13c87aa9e6caa8ed7fae39e07e0163d36af740e
-
Filesize
644KB
MD52803bd7e4847029013fc2029d691063b
SHA1d66a1c4d1db1211e69748e47cc555dbb7514bd90
SHA25609227728572f7c91e51eb0d644c7d0620f3518ca2fd5ebfd08354f78f39b1e96
SHA512dea627c11f468503622da932da3076079dd3216a57125d598c227136e9ddec713a51195aea347b421c3c59f41a2528229534e7dbcafd61f03fb930d64c690e6c
-
Filesize
644KB
MD52803bd7e4847029013fc2029d691063b
SHA1d66a1c4d1db1211e69748e47cc555dbb7514bd90
SHA25609227728572f7c91e51eb0d644c7d0620f3518ca2fd5ebfd08354f78f39b1e96
SHA512dea627c11f468503622da932da3076079dd3216a57125d598c227136e9ddec713a51195aea347b421c3c59f41a2528229534e7dbcafd61f03fb930d64c690e6c
-
Filesize
271KB
MD510cf195a9a24f501de87a134b50d7af7
SHA16de378612ae6e13359d782d3c1c0e6aed54f54ad
SHA2563f559dba01bf7b9565b055e5b475540238e559d721fe580a2025c2bba7392a13
SHA51249c4f8f5ecf243c961b63250b3f6916a413270ce7d869a47c2f86d84f8fc692badca654a15b6a5906672ca4c4ceeaffae9556da498735d78827be518ac38e3ff
-
Filesize
271KB
MD510cf195a9a24f501de87a134b50d7af7
SHA16de378612ae6e13359d782d3c1c0e6aed54f54ad
SHA2563f559dba01bf7b9565b055e5b475540238e559d721fe580a2025c2bba7392a13
SHA51249c4f8f5ecf243c961b63250b3f6916a413270ce7d869a47c2f86d84f8fc692badca654a15b6a5906672ca4c4ceeaffae9556da498735d78827be518ac38e3ff
-
Filesize
384KB
MD5b230f8f335e72b812e365f750878b233
SHA188dcefc140b1045b4d1d9a251c6d7ac943b32a44
SHA2560926833a96a2828f83a8f0d1e1dfdbc11f6ae3eb4a47e84c951553555898a056
SHA51244d180f62dd00927d9f0f441c3b43f49bed584b6713243fd5ef3572f9267460dd243b54cce36a5c58da28c06b5fb87d4677f78c5bfe64c5d74e1dac4a3684897
-
Filesize
384KB
MD5b230f8f335e72b812e365f750878b233
SHA188dcefc140b1045b4d1d9a251c6d7ac943b32a44
SHA2560926833a96a2828f83a8f0d1e1dfdbc11f6ae3eb4a47e84c951553555898a056
SHA51244d180f62dd00927d9f0f441c3b43f49bed584b6713243fd5ef3572f9267460dd243b54cce36a5c58da28c06b5fb87d4677f78c5bfe64c5d74e1dac4a3684897
-
Filesize
292KB
MD56f713a806a86090f53ecaa7de0af597b
SHA1677d8f5716345ce387bb7c6889fa34889c4df125
SHA256e082a62eac8daee62b15436fb55b4fe3193d3b28f802ca90817c5ad7fe8491fa
SHA51235e45d6a6a11ea566ef2a5caa9541b6467f5afb24a14f224fc0f75b7268717fca72fa0189d79e5ac6b53f7631305885085ebd2e1902b2b6b8687cb4870a40d8d
-
Filesize
292KB
MD56f713a806a86090f53ecaa7de0af597b
SHA1677d8f5716345ce387bb7c6889fa34889c4df125
SHA256e082a62eac8daee62b15436fb55b4fe3193d3b28f802ca90817c5ad7fe8491fa
SHA51235e45d6a6a11ea566ef2a5caa9541b6467f5afb24a14f224fc0f75b7268717fca72fa0189d79e5ac6b53f7631305885085ebd2e1902b2b6b8687cb4870a40d8d
-
Filesize
168KB
MD5fc3447b58fe9d51e7eab91baa0249b74
SHA19c802d403c64ccef6cfcf25bb5cf5bd6d994d5aa
SHA2565a33f24d59541fc24a604594f63e200b1623466f20d422277ef04b4bde5259f7
SHA5128ac1ce4274f218bf3766e8d722b8f2ed1dfc58aefa0895b00381267bdc88ffa7f8ba539728dff086b4be03a5cdd92428620bb831b2d52c2e87e621cf07243a6d
-
Filesize
168KB
MD5fc3447b58fe9d51e7eab91baa0249b74
SHA19c802d403c64ccef6cfcf25bb5cf5bd6d994d5aa
SHA2565a33f24d59541fc24a604594f63e200b1623466f20d422277ef04b4bde5259f7
SHA5128ac1ce4274f218bf3766e8d722b8f2ed1dfc58aefa0895b00381267bdc88ffa7f8ba539728dff086b4be03a5cdd92428620bb831b2d52c2e87e621cf07243a6d
-
Filesize
271KB
MD510cf195a9a24f501de87a134b50d7af7
SHA16de378612ae6e13359d782d3c1c0e6aed54f54ad
SHA2563f559dba01bf7b9565b055e5b475540238e559d721fe580a2025c2bba7392a13
SHA51249c4f8f5ecf243c961b63250b3f6916a413270ce7d869a47c2f86d84f8fc692badca654a15b6a5906672ca4c4ceeaffae9556da498735d78827be518ac38e3ff
-
Filesize
271KB
MD510cf195a9a24f501de87a134b50d7af7
SHA16de378612ae6e13359d782d3c1c0e6aed54f54ad
SHA2563f559dba01bf7b9565b055e5b475540238e559d721fe580a2025c2bba7392a13
SHA51249c4f8f5ecf243c961b63250b3f6916a413270ce7d869a47c2f86d84f8fc692badca654a15b6a5906672ca4c4ceeaffae9556da498735d78827be518ac38e3ff
-
Filesize
271KB
MD510cf195a9a24f501de87a134b50d7af7
SHA16de378612ae6e13359d782d3c1c0e6aed54f54ad
SHA2563f559dba01bf7b9565b055e5b475540238e559d721fe580a2025c2bba7392a13
SHA51249c4f8f5ecf243c961b63250b3f6916a413270ce7d869a47c2f86d84f8fc692badca654a15b6a5906672ca4c4ceeaffae9556da498735d78827be518ac38e3ff
-
Filesize
271KB
MD510cf195a9a24f501de87a134b50d7af7
SHA16de378612ae6e13359d782d3c1c0e6aed54f54ad
SHA2563f559dba01bf7b9565b055e5b475540238e559d721fe580a2025c2bba7392a13
SHA51249c4f8f5ecf243c961b63250b3f6916a413270ce7d869a47c2f86d84f8fc692badca654a15b6a5906672ca4c4ceeaffae9556da498735d78827be518ac38e3ff
-
Filesize
271KB
MD510cf195a9a24f501de87a134b50d7af7
SHA16de378612ae6e13359d782d3c1c0e6aed54f54ad
SHA2563f559dba01bf7b9565b055e5b475540238e559d721fe580a2025c2bba7392a13
SHA51249c4f8f5ecf243c961b63250b3f6916a413270ce7d869a47c2f86d84f8fc692badca654a15b6a5906672ca4c4ceeaffae9556da498735d78827be518ac38e3ff
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b