Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2023 04:39
Static task
static1
Behavioral task
behavioral1
Sample
e4ab1af9932a314c59953eaa79e794063aa4f91b1dcc7bb1a135da4bc8e2c2e1.exe
Resource
win10v2004-20230220-en
General
-
Target
e4ab1af9932a314c59953eaa79e794063aa4f91b1dcc7bb1a135da4bc8e2c2e1.exe
-
Size
1.2MB
-
MD5
97037243c7aea47d8d7fc356bd424234
-
SHA1
efd824a3b1c20dbccacade360f22f016b8d4b690
-
SHA256
e4ab1af9932a314c59953eaa79e794063aa4f91b1dcc7bb1a135da4bc8e2c2e1
-
SHA512
3d1d0937c7b6d7781717759e3caef7a6389dfb1ea6c2846507b059756806538697df4f0a4d3ef45e02159e366987c66ac8c3508dcead098138445adba98fc4d2
-
SSDEEP
24576:9yaQagU+EJycRzhqiscOPS3XHhMfyjMp0dftclTgRNMTIyw6NT9N:YBU+qNdOPSnHhMCVPcJ8N0IONT9
Malware Config
Extracted
redline
lakio
217.196.96.56:4138
-
auth_value
5a2372e90cce274157a245c74afe9d6e
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6061525582:AAFPvlW9QGc3uVJL_L24zOg73vef9BMJYks/sendMessage?chat_id=5845681975
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" n8251141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" n8251141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" n8251141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p4964789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p4964789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p4964789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p4964789.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection n8251141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" n8251141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" n8251141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p4964789.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/1704-2516-0x0000000000400000-0x0000000000432000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1704-2516-0x0000000000400000-0x0000000000432000-memory.dmp asyncrat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Rn7yRZDGjUDjkIw.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation r8417965.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation s1435486.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 14 IoCs
pid Process 3572 z8892400.exe 2428 z2309974.exe 2896 z7232263.exe 2280 n8251141.exe 1944 o0985242.exe 2752 p4964789.exe 4596 r8417965.exe 2388 1.exe 2592 s1435486.exe 2212 oneetx.exe 2900 Rn7yRZDGjUDjkIw.exe 3396 oneetx.exe 1704 Rn7yRZDGjUDjkIw.exe 3008 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 424 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features n8251141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" n8251141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" p4964789.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z2309974.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z2309974.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7232263.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7232263.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e4ab1af9932a314c59953eaa79e794063aa4f91b1dcc7bb1a135da4bc8e2c2e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e4ab1af9932a314c59953eaa79e794063aa4f91b1dcc7bb1a135da4bc8e2c2e1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8892400.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8892400.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 9 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\0d190aa2d37c1d60bc2efbca4cf6b02b\Admin@ROBKQPFG_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini Rn7yRZDGjUDjkIw.exe File created C:\Users\Admin\AppData\Local\0d190aa2d37c1d60bc2efbca4cf6b02b\Admin@ROBKQPFG_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini Rn7yRZDGjUDjkIw.exe File created C:\Users\Admin\AppData\Local\0d190aa2d37c1d60bc2efbca4cf6b02b\Admin@ROBKQPFG_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini Rn7yRZDGjUDjkIw.exe File created C:\Users\Admin\AppData\Local\0d190aa2d37c1d60bc2efbca4cf6b02b\Admin@ROBKQPFG_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini Rn7yRZDGjUDjkIw.exe File created C:\Users\Admin\AppData\Local\0d190aa2d37c1d60bc2efbca4cf6b02b\Admin@ROBKQPFG_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini Rn7yRZDGjUDjkIw.exe File opened for modification C:\Users\Admin\AppData\Local\0d190aa2d37c1d60bc2efbca4cf6b02b\Admin@ROBKQPFG_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini Rn7yRZDGjUDjkIw.exe File opened for modification C:\Users\Admin\AppData\Local\0d190aa2d37c1d60bc2efbca4cf6b02b\Admin@ROBKQPFG_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini Rn7yRZDGjUDjkIw.exe File opened for modification C:\Users\Admin\AppData\Local\0d190aa2d37c1d60bc2efbca4cf6b02b\Admin@ROBKQPFG_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini Rn7yRZDGjUDjkIw.exe File created C:\Users\Admin\AppData\Local\0d190aa2d37c1d60bc2efbca4cf6b02b\Admin@ROBKQPFG_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini Rn7yRZDGjUDjkIw.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 59 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2900 set thread context of 1704 2900 Rn7yRZDGjUDjkIw.exe 115 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1284 2280 WerFault.exe 89 3196 4596 WerFault.exe 99 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Rn7yRZDGjUDjkIw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Rn7yRZDGjUDjkIw.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3772 schtasks.exe 2568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2280 n8251141.exe 2280 n8251141.exe 1944 o0985242.exe 1944 o0985242.exe 2752 p4964789.exe 2752 p4964789.exe 2388 1.exe 2388 1.exe 2900 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe 1704 Rn7yRZDGjUDjkIw.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2280 n8251141.exe Token: SeDebugPrivilege 1944 o0985242.exe Token: SeDebugPrivilege 2752 p4964789.exe Token: SeDebugPrivilege 4596 r8417965.exe Token: SeDebugPrivilege 2388 1.exe Token: SeDebugPrivilege 2900 Rn7yRZDGjUDjkIw.exe Token: SeDebugPrivilege 1704 Rn7yRZDGjUDjkIw.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2592 s1435486.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1828 wrote to memory of 3572 1828 e4ab1af9932a314c59953eaa79e794063aa4f91b1dcc7bb1a135da4bc8e2c2e1.exe 86 PID 1828 wrote to memory of 3572 1828 e4ab1af9932a314c59953eaa79e794063aa4f91b1dcc7bb1a135da4bc8e2c2e1.exe 86 PID 1828 wrote to memory of 3572 1828 e4ab1af9932a314c59953eaa79e794063aa4f91b1dcc7bb1a135da4bc8e2c2e1.exe 86 PID 3572 wrote to memory of 2428 3572 z8892400.exe 87 PID 3572 wrote to memory of 2428 3572 z8892400.exe 87 PID 3572 wrote to memory of 2428 3572 z8892400.exe 87 PID 2428 wrote to memory of 2896 2428 z2309974.exe 88 PID 2428 wrote to memory of 2896 2428 z2309974.exe 88 PID 2428 wrote to memory of 2896 2428 z2309974.exe 88 PID 2896 wrote to memory of 2280 2896 z7232263.exe 89 PID 2896 wrote to memory of 2280 2896 z7232263.exe 89 PID 2896 wrote to memory of 2280 2896 z7232263.exe 89 PID 2896 wrote to memory of 1944 2896 z7232263.exe 95 PID 2896 wrote to memory of 1944 2896 z7232263.exe 95 PID 2896 wrote to memory of 1944 2896 z7232263.exe 95 PID 2428 wrote to memory of 2752 2428 z2309974.exe 96 PID 2428 wrote to memory of 2752 2428 z2309974.exe 96 PID 2428 wrote to memory of 2752 2428 z2309974.exe 96 PID 3572 wrote to memory of 4596 3572 z8892400.exe 99 PID 3572 wrote to memory of 4596 3572 z8892400.exe 99 PID 3572 wrote to memory of 4596 3572 z8892400.exe 99 PID 4596 wrote to memory of 2388 4596 r8417965.exe 103 PID 4596 wrote to memory of 2388 4596 r8417965.exe 103 PID 4596 wrote to memory of 2388 4596 r8417965.exe 103 PID 1828 wrote to memory of 2592 1828 e4ab1af9932a314c59953eaa79e794063aa4f91b1dcc7bb1a135da4bc8e2c2e1.exe 106 PID 1828 wrote to memory of 2592 1828 e4ab1af9932a314c59953eaa79e794063aa4f91b1dcc7bb1a135da4bc8e2c2e1.exe 106 PID 1828 wrote to memory of 2592 1828 e4ab1af9932a314c59953eaa79e794063aa4f91b1dcc7bb1a135da4bc8e2c2e1.exe 106 PID 2592 wrote to memory of 2212 2592 s1435486.exe 107 PID 2592 wrote to memory of 2212 2592 s1435486.exe 107 PID 2592 wrote to memory of 2212 2592 s1435486.exe 107 PID 2212 wrote to memory of 3772 2212 oneetx.exe 108 PID 2212 wrote to memory of 3772 2212 oneetx.exe 108 PID 2212 wrote to memory of 3772 2212 oneetx.exe 108 PID 2212 wrote to memory of 2900 2212 oneetx.exe 110 PID 2212 wrote to memory of 2900 2212 oneetx.exe 110 PID 2212 wrote to memory of 2900 2212 oneetx.exe 110 PID 2212 wrote to memory of 424 2212 oneetx.exe 112 PID 2212 wrote to memory of 424 2212 oneetx.exe 112 PID 2212 wrote to memory of 424 2212 oneetx.exe 112 PID 2900 wrote to memory of 2568 2900 Rn7yRZDGjUDjkIw.exe 113 PID 2900 wrote to memory of 2568 2900 Rn7yRZDGjUDjkIw.exe 113 PID 2900 wrote to memory of 2568 2900 Rn7yRZDGjUDjkIw.exe 113 PID 2900 wrote to memory of 1704 2900 Rn7yRZDGjUDjkIw.exe 115 PID 2900 wrote to memory of 1704 2900 Rn7yRZDGjUDjkIw.exe 115 PID 2900 wrote to memory of 1704 2900 Rn7yRZDGjUDjkIw.exe 115 PID 2900 wrote to memory of 1704 2900 Rn7yRZDGjUDjkIw.exe 115 PID 2900 wrote to memory of 1704 2900 Rn7yRZDGjUDjkIw.exe 115 PID 2900 wrote to memory of 1704 2900 Rn7yRZDGjUDjkIw.exe 115 PID 2900 wrote to memory of 1704 2900 Rn7yRZDGjUDjkIw.exe 115 PID 2900 wrote to memory of 1704 2900 Rn7yRZDGjUDjkIw.exe 115 PID 1704 wrote to memory of 3652 1704 Rn7yRZDGjUDjkIw.exe 116 PID 1704 wrote to memory of 3652 1704 Rn7yRZDGjUDjkIw.exe 116 PID 1704 wrote to memory of 3652 1704 Rn7yRZDGjUDjkIw.exe 116 PID 3652 wrote to memory of 4680 3652 cmd.exe 118 PID 3652 wrote to memory of 4680 3652 cmd.exe 118 PID 3652 wrote to memory of 4680 3652 cmd.exe 118 PID 3652 wrote to memory of 2636 3652 cmd.exe 119 PID 3652 wrote to memory of 2636 3652 cmd.exe 119 PID 3652 wrote to memory of 2636 3652 cmd.exe 119 PID 3652 wrote to memory of 5088 3652 cmd.exe 120 PID 3652 wrote to memory of 5088 3652 cmd.exe 120 PID 3652 wrote to memory of 5088 3652 cmd.exe 120 PID 1704 wrote to memory of 4604 1704 Rn7yRZDGjUDjkIw.exe 121 PID 1704 wrote to memory of 4604 1704 Rn7yRZDGjUDjkIw.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4ab1af9932a314c59953eaa79e794063aa4f91b1dcc7bb1a135da4bc8e2c2e1.exe"C:\Users\Admin\AppData\Local\Temp\e4ab1af9932a314c59953eaa79e794063aa4f91b1dcc7bb1a135da4bc8e2c2e1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8892400.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8892400.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2309974.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2309974.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7232263.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7232263.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n8251141.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n8251141.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 10846⤵
- Program crash
PID:1284
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o0985242.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o0985242.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4964789.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4964789.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8417965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8417965.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 13764⤵
- Program crash
PID:3196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1435486.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1435486.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3772
-
-
C:\Users\Admin\AppData\Local\Temp\1000084001\Rn7yRZDGjUDjkIw.exe"C:\Users\Admin\AppData\Local\Temp\1000084001\Rn7yRZDGjUDjkIw.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PGtueNPKAcU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2759.tmp"5⤵
- Creates scheduled task(s)
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\1000084001\Rn7yRZDGjUDjkIw.exe"{path}"5⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All6⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:4680
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile7⤵PID:2636
-
-
C:\Windows\SysWOW64\findstr.exefindstr All7⤵PID:5088
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid6⤵PID:4604
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:1112
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid7⤵PID:4728
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:424
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2280 -ip 22801⤵PID:4156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4596 -ip 45961⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:3396
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:3008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\0d190aa2d37c1d60bc2efbca4cf6b02b\Admin@ROBKQPFG_en-US\System\Process.txt
Filesize4KB
MD5ca4561a0085c4d861b12709a10f266c7
SHA1fa93d75cb1b2adcd7e72de7c71ef4b33ce4a2ab7
SHA2565ed38329674a6d082a44cd3f808131f15fe523ad833ba2c5164dd5e96e097080
SHA512add1e6b739509b16e4c85ed94ec38e5bf0184565289eb07a3ee1871e74c4407b3524d842d7ae87ebf1813fbf0da4828ca9aba71ed95a0eb9fabde6a27aaba0ee
-
Filesize
1KB
MD584e77a587d94307c0ac1357eb4d3d46f
SHA183cc900f9401f43d181207d64c5adba7a85edc1e
SHA256e16024b092a026a9dc00df69d4b9bbcab7b2dc178dc5291fc308a1abc9304a99
SHA512aefb5c62200b3ed97718d20a89990954d4d8acdc0a6a73c5a420f1bba619cb79e70c2cd0a579b9f52dc6b09e1de2cea6cd6cac4376cfee92d94e2c01d310f691
-
Filesize
580KB
MD5ee5642a8f51b63bc2aa5ee686abe5678
SHA17b11a1f4e4f1541164dd3616090b84564d4a9aa3
SHA25640d51dbfc438dbf04da507650cc73cfd1ccf369894d330b0bd5b207f8be674df
SHA5121bdb73691f95d14d1c04b9592a3f4c9b295a64b6992266d1eef8beb758ea2fd276a067b6223ae46182cc8437b95c2df14113ab2bd9b9b491d6ec4b519af9bc9f
-
Filesize
580KB
MD5ee5642a8f51b63bc2aa5ee686abe5678
SHA17b11a1f4e4f1541164dd3616090b84564d4a9aa3
SHA25640d51dbfc438dbf04da507650cc73cfd1ccf369894d330b0bd5b207f8be674df
SHA5121bdb73691f95d14d1c04b9592a3f4c9b295a64b6992266d1eef8beb758ea2fd276a067b6223ae46182cc8437b95c2df14113ab2bd9b9b491d6ec4b519af9bc9f
-
Filesize
580KB
MD5ee5642a8f51b63bc2aa5ee686abe5678
SHA17b11a1f4e4f1541164dd3616090b84564d4a9aa3
SHA25640d51dbfc438dbf04da507650cc73cfd1ccf369894d330b0bd5b207f8be674df
SHA5121bdb73691f95d14d1c04b9592a3f4c9b295a64b6992266d1eef8beb758ea2fd276a067b6223ae46182cc8437b95c2df14113ab2bd9b9b491d6ec4b519af9bc9f
-
Filesize
580KB
MD5ee5642a8f51b63bc2aa5ee686abe5678
SHA17b11a1f4e4f1541164dd3616090b84564d4a9aa3
SHA25640d51dbfc438dbf04da507650cc73cfd1ccf369894d330b0bd5b207f8be674df
SHA5121bdb73691f95d14d1c04b9592a3f4c9b295a64b6992266d1eef8beb758ea2fd276a067b6223ae46182cc8437b95c2df14113ab2bd9b9b491d6ec4b519af9bc9f
-
Filesize
230KB
MD5c78b6ba454e53bce13432712d0a9f291
SHA19f803c5506b9b8760a60e21b74880d527c17d276
SHA2564d0b39722b2fad0da4755ed11a198c6a9c06f7ed6d4ba3e0a4dc52f4eaeec14e
SHA5123d0cb20b3237be91bc48b9fccaed283d6e8cb77588a9b78e36ef44c7c051d65741b626551b7f0f7c94fe3417f515369147b20be7ffe4de434f76022f752c988f
-
Filesize
230KB
MD5c78b6ba454e53bce13432712d0a9f291
SHA19f803c5506b9b8760a60e21b74880d527c17d276
SHA2564d0b39722b2fad0da4755ed11a198c6a9c06f7ed6d4ba3e0a4dc52f4eaeec14e
SHA5123d0cb20b3237be91bc48b9fccaed283d6e8cb77588a9b78e36ef44c7c051d65741b626551b7f0f7c94fe3417f515369147b20be7ffe4de434f76022f752c988f
-
Filesize
230KB
MD5c78b6ba454e53bce13432712d0a9f291
SHA19f803c5506b9b8760a60e21b74880d527c17d276
SHA2564d0b39722b2fad0da4755ed11a198c6a9c06f7ed6d4ba3e0a4dc52f4eaeec14e
SHA5123d0cb20b3237be91bc48b9fccaed283d6e8cb77588a9b78e36ef44c7c051d65741b626551b7f0f7c94fe3417f515369147b20be7ffe4de434f76022f752c988f
-
Filesize
230KB
MD5c78b6ba454e53bce13432712d0a9f291
SHA19f803c5506b9b8760a60e21b74880d527c17d276
SHA2564d0b39722b2fad0da4755ed11a198c6a9c06f7ed6d4ba3e0a4dc52f4eaeec14e
SHA5123d0cb20b3237be91bc48b9fccaed283d6e8cb77588a9b78e36ef44c7c051d65741b626551b7f0f7c94fe3417f515369147b20be7ffe4de434f76022f752c988f
-
Filesize
230KB
MD5c78b6ba454e53bce13432712d0a9f291
SHA19f803c5506b9b8760a60e21b74880d527c17d276
SHA2564d0b39722b2fad0da4755ed11a198c6a9c06f7ed6d4ba3e0a4dc52f4eaeec14e
SHA5123d0cb20b3237be91bc48b9fccaed283d6e8cb77588a9b78e36ef44c7c051d65741b626551b7f0f7c94fe3417f515369147b20be7ffe4de434f76022f752c988f
-
Filesize
230KB
MD5c78b6ba454e53bce13432712d0a9f291
SHA19f803c5506b9b8760a60e21b74880d527c17d276
SHA2564d0b39722b2fad0da4755ed11a198c6a9c06f7ed6d4ba3e0a4dc52f4eaeec14e
SHA5123d0cb20b3237be91bc48b9fccaed283d6e8cb77588a9b78e36ef44c7c051d65741b626551b7f0f7c94fe3417f515369147b20be7ffe4de434f76022f752c988f
-
Filesize
230KB
MD5c78b6ba454e53bce13432712d0a9f291
SHA19f803c5506b9b8760a60e21b74880d527c17d276
SHA2564d0b39722b2fad0da4755ed11a198c6a9c06f7ed6d4ba3e0a4dc52f4eaeec14e
SHA5123d0cb20b3237be91bc48b9fccaed283d6e8cb77588a9b78e36ef44c7c051d65741b626551b7f0f7c94fe3417f515369147b20be7ffe4de434f76022f752c988f
-
Filesize
1.0MB
MD54c545a2332a68c2a46cb7fb001eda7ce
SHA1ee0034544d526423911f56e7e266f3e0b4e5e18a
SHA256c58f0609f80c491446098384b44be07830d491c0535e17b52a86f4598b431fcb
SHA5125f9906855a2270203e80570dcbe520633f5fe012afbe74bc5cab8c7254b3f3f253efc27d9078a786a7533fa3e674180a37ec31081cf6d202cc45bffceef4ecc0
-
Filesize
1.0MB
MD54c545a2332a68c2a46cb7fb001eda7ce
SHA1ee0034544d526423911f56e7e266f3e0b4e5e18a
SHA256c58f0609f80c491446098384b44be07830d491c0535e17b52a86f4598b431fcb
SHA5125f9906855a2270203e80570dcbe520633f5fe012afbe74bc5cab8c7254b3f3f253efc27d9078a786a7533fa3e674180a37ec31081cf6d202cc45bffceef4ecc0
-
Filesize
502KB
MD5d1ab7b69bc9f0647da82ed1375d6adf5
SHA18f4d1ab2edbaaa65962ea9cd311bad593420dd6b
SHA25623658e0b9a5a6d70cb94a84c0bd1e7703a600853ab2cbf5b2f944bec9ba37213
SHA512a84b85a01204d4b06fdbaceb6289f6f7c8c9a3b6d25bb6196aa49240de3778418d4cdf3a3558abcfab09c8796fceb9155a01a2c9fba1d1e2c5950cfa9adb929d
-
Filesize
502KB
MD5d1ab7b69bc9f0647da82ed1375d6adf5
SHA18f4d1ab2edbaaa65962ea9cd311bad593420dd6b
SHA25623658e0b9a5a6d70cb94a84c0bd1e7703a600853ab2cbf5b2f944bec9ba37213
SHA512a84b85a01204d4b06fdbaceb6289f6f7c8c9a3b6d25bb6196aa49240de3778418d4cdf3a3558abcfab09c8796fceb9155a01a2c9fba1d1e2c5950cfa9adb929d
-
Filesize
598KB
MD55873feaa791521bba339c22ffe38d895
SHA1dcef268d7431b3051faafc6c496e479b57e7218a
SHA256949ac421284e02d79e54178133ceb82b6908e122a0f1aaff0761e62099d269b6
SHA5121ca5980f4e7af328f31b23639a69a3f258dafe98f53582c6f7ff8931b2bbcfe6c1d5a5c7b63909d305bdefafc12195aded0ba4e5fa0c19840c35b7c535b30f91
-
Filesize
598KB
MD55873feaa791521bba339c22ffe38d895
SHA1dcef268d7431b3051faafc6c496e479b57e7218a
SHA256949ac421284e02d79e54178133ceb82b6908e122a0f1aaff0761e62099d269b6
SHA5121ca5980f4e7af328f31b23639a69a3f258dafe98f53582c6f7ff8931b2bbcfe6c1d5a5c7b63909d305bdefafc12195aded0ba4e5fa0c19840c35b7c535b30f91
-
Filesize
179KB
MD5b00a91f39d9b99533482f66d22e0411b
SHA1a680047ed7a2014ccd4020b59dc6f03881fac7cf
SHA256e8da2b220b5b2f40f2f1e208c1a3cb7c5643a867381b8cf4727893dfa3b40eff
SHA5125f6b3c9202147994e60e78b3798e3200900bf262b1a2be0d1afbf841520a4757c2f8fc0b96b2fb0238071b3f9cdb132614cdcfd946e30f68e79e4b58f7acf86e
-
Filesize
179KB
MD5b00a91f39d9b99533482f66d22e0411b
SHA1a680047ed7a2014ccd4020b59dc6f03881fac7cf
SHA256e8da2b220b5b2f40f2f1e208c1a3cb7c5643a867381b8cf4727893dfa3b40eff
SHA5125f6b3c9202147994e60e78b3798e3200900bf262b1a2be0d1afbf841520a4757c2f8fc0b96b2fb0238071b3f9cdb132614cdcfd946e30f68e79e4b58f7acf86e
-
Filesize
394KB
MD555b37b7bcb5ddedeff863f62d35b95d2
SHA119ef6066dfd20bbd3dc3fb19fd93c37b7597f698
SHA256e46723fda73041e1861c95afbf9007505731f02b6cd94ff561c6c518af4e9cd3
SHA512c2eb6fb7cc8f15fb052873112c02fd46848703efbd183a2ee4f607ab4c0d98c54b5143abc7afbbb62b7271662696383e671263a7660024bf2e419fcda875b6a7
-
Filesize
394KB
MD555b37b7bcb5ddedeff863f62d35b95d2
SHA119ef6066dfd20bbd3dc3fb19fd93c37b7597f698
SHA256e46723fda73041e1861c95afbf9007505731f02b6cd94ff561c6c518af4e9cd3
SHA512c2eb6fb7cc8f15fb052873112c02fd46848703efbd183a2ee4f607ab4c0d98c54b5143abc7afbbb62b7271662696383e671263a7660024bf2e419fcda875b6a7
-
Filesize
315KB
MD5708a801b322092aeae9951a82aa73a34
SHA1a724dcbfa31ff7e684979c2a9f4c1363871c17e1
SHA25684e42ade72e9419a23ea01ce3d3c03f1965dafc75b95873bbc881a03dd753f88
SHA512a63d1659d032dbf7c9ab63ed0865ae11bed85410d34e5ef988e221d49d1ab85328fffc70ac5c477fea1aa6f3b4c2eab60da66a28c037c2d120e159966028caf5
-
Filesize
315KB
MD5708a801b322092aeae9951a82aa73a34
SHA1a724dcbfa31ff7e684979c2a9f4c1363871c17e1
SHA25684e42ade72e9419a23ea01ce3d3c03f1965dafc75b95873bbc881a03dd753f88
SHA512a63d1659d032dbf7c9ab63ed0865ae11bed85410d34e5ef988e221d49d1ab85328fffc70ac5c477fea1aa6f3b4c2eab60da66a28c037c2d120e159966028caf5
-
Filesize
168KB
MD5e2fb851eab90b60bd421b19ae281301a
SHA1fb970f0f869446659fdc8aca6f7fed9326b5ffbb
SHA2564acee3b616f3a64fbf3f8cf61d3d7a2a2d34d0e10ffe23f5c89dcac1fbb403b4
SHA512670ddacb8d87ace663fd1e2aeb95523a8c8588081bf098e62e9dd3ad93016ca4719f567efbc342b27adab31df63b22ecdc839338a202ce63a1755b06c73c0075
-
Filesize
168KB
MD5e2fb851eab90b60bd421b19ae281301a
SHA1fb970f0f869446659fdc8aca6f7fed9326b5ffbb
SHA2564acee3b616f3a64fbf3f8cf61d3d7a2a2d34d0e10ffe23f5c89dcac1fbb403b4
SHA512670ddacb8d87ace663fd1e2aeb95523a8c8588081bf098e62e9dd3ad93016ca4719f567efbc342b27adab31df63b22ecdc839338a202ce63a1755b06c73c0075
-
Filesize
1KB
MD53908164819143c162dc9aa22cbd53379
SHA17c06e3174ea0ea306c97dbe04496d4b44aeffde9
SHA256bc68fc3b4ff700f44a01ca02dc4f0228af1a2efe7546431033db1b796b9abd9d
SHA512ffb3097071b8a506f14f493c6762e4fd641aa794a7a8bf82b0e56d3fb712b96e8cc403b21f4aac74ab32ff44304b22433ac875cda36cd07515916e8603535486
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b