Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
78766864342f8194ad3d4357996cba7a0eafbb1329a080fc5068a7bf1037c556.exe
Resource
win10v2004-20230220-en
General
-
Target
78766864342f8194ad3d4357996cba7a0eafbb1329a080fc5068a7bf1037c556.exe
-
Size
1.5MB
-
MD5
2552bef7fa65958722b4c1d686068d26
-
SHA1
2315e9ea1400c9f3cb950428a8cd0c62b5424cae
-
SHA256
78766864342f8194ad3d4357996cba7a0eafbb1329a080fc5068a7bf1037c556
-
SHA512
b422db17ed4c1da4e087fbcb0a410eee620af744eb3adca5b07ded3e784d0990f78851195b339edfcba79f1d36b3e4472c2648e39aacc51cf3f0bd6d38ef9c2a
-
SSDEEP
49152:UIuwgTvA6b6wNmwB3eKIbppnACiXaDTBq6:7u5cwNkK8XAPXaD3
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d7089178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1555321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d7089178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d7089178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d7089178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1555321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d7089178.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a1555321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1555321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1555321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1555321.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation c8003081.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation e2746600.exe -
Executes dropped EXE 13 IoCs
pid Process 5084 v1691462.exe 1684 v4662436.exe 1180 v3745064.exe 736 v5781171.exe 1124 a1555321.exe 4612 b8805847.exe 5052 c8003081.exe 2580 oneetx.exe 1240 d7089178.exe 3276 e2746600.exe 3392 1.exe 2576 f6713358.exe 4808 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1664 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1555321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1555321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d7089178.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v5781171.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 78766864342f8194ad3d4357996cba7a0eafbb1329a080fc5068a7bf1037c556.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 78766864342f8194ad3d4357996cba7a0eafbb1329a080fc5068a7bf1037c556.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1691462.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1691462.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4662436.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4662436.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3745064.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3745064.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5781171.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 2936 1124 WerFault.exe 89 4688 5052 WerFault.exe 96 4584 5052 WerFault.exe 96 4644 5052 WerFault.exe 96 3408 5052 WerFault.exe 96 3744 5052 WerFault.exe 96 3748 5052 WerFault.exe 96 4800 5052 WerFault.exe 96 5020 5052 WerFault.exe 96 4556 5052 WerFault.exe 96 4328 5052 WerFault.exe 96 4720 2580 WerFault.exe 116 260 2580 WerFault.exe 116 2792 2580 WerFault.exe 116 4204 2580 WerFault.exe 116 5040 2580 WerFault.exe 116 1840 2580 WerFault.exe 116 3476 2580 WerFault.exe 116 2464 2580 WerFault.exe 116 4388 2580 WerFault.exe 116 2924 2580 WerFault.exe 116 3608 2580 WerFault.exe 116 4792 2580 WerFault.exe 116 1592 2580 WerFault.exe 116 3828 3276 WerFault.exe 159 4400 2580 WerFault.exe 116 2804 2580 WerFault.exe 116 1240 2580 WerFault.exe 116 4372 4808 WerFault.exe 171 3340 2580 WerFault.exe 116 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1124 a1555321.exe 1124 a1555321.exe 4612 b8805847.exe 4612 b8805847.exe 1240 d7089178.exe 1240 d7089178.exe 3392 1.exe 3392 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1124 a1555321.exe Token: SeDebugPrivilege 4612 b8805847.exe Token: SeDebugPrivilege 1240 d7089178.exe Token: SeDebugPrivilege 3276 e2746600.exe Token: SeDebugPrivilege 3392 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5052 c8003081.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4980 wrote to memory of 5084 4980 78766864342f8194ad3d4357996cba7a0eafbb1329a080fc5068a7bf1037c556.exe 85 PID 4980 wrote to memory of 5084 4980 78766864342f8194ad3d4357996cba7a0eafbb1329a080fc5068a7bf1037c556.exe 85 PID 4980 wrote to memory of 5084 4980 78766864342f8194ad3d4357996cba7a0eafbb1329a080fc5068a7bf1037c556.exe 85 PID 5084 wrote to memory of 1684 5084 v1691462.exe 86 PID 5084 wrote to memory of 1684 5084 v1691462.exe 86 PID 5084 wrote to memory of 1684 5084 v1691462.exe 86 PID 1684 wrote to memory of 1180 1684 v4662436.exe 87 PID 1684 wrote to memory of 1180 1684 v4662436.exe 87 PID 1684 wrote to memory of 1180 1684 v4662436.exe 87 PID 1180 wrote to memory of 736 1180 v3745064.exe 88 PID 1180 wrote to memory of 736 1180 v3745064.exe 88 PID 1180 wrote to memory of 736 1180 v3745064.exe 88 PID 736 wrote to memory of 1124 736 v5781171.exe 89 PID 736 wrote to memory of 1124 736 v5781171.exe 89 PID 736 wrote to memory of 1124 736 v5781171.exe 89 PID 736 wrote to memory of 4612 736 v5781171.exe 95 PID 736 wrote to memory of 4612 736 v5781171.exe 95 PID 736 wrote to memory of 4612 736 v5781171.exe 95 PID 1180 wrote to memory of 5052 1180 v3745064.exe 96 PID 1180 wrote to memory of 5052 1180 v3745064.exe 96 PID 1180 wrote to memory of 5052 1180 v3745064.exe 96 PID 5052 wrote to memory of 2580 5052 c8003081.exe 116 PID 5052 wrote to memory of 2580 5052 c8003081.exe 116 PID 5052 wrote to memory of 2580 5052 c8003081.exe 116 PID 1684 wrote to memory of 1240 1684 v4662436.exe 120 PID 1684 wrote to memory of 1240 1684 v4662436.exe 120 PID 1684 wrote to memory of 1240 1684 v4662436.exe 120 PID 2580 wrote to memory of 4532 2580 oneetx.exe 135 PID 2580 wrote to memory of 4532 2580 oneetx.exe 135 PID 2580 wrote to memory of 4532 2580 oneetx.exe 135 PID 2580 wrote to memory of 2004 2580 oneetx.exe 143 PID 2580 wrote to memory of 2004 2580 oneetx.exe 143 PID 2580 wrote to memory of 2004 2580 oneetx.exe 143 PID 2004 wrote to memory of 1904 2004 cmd.exe 147 PID 2004 wrote to memory of 1904 2004 cmd.exe 147 PID 2004 wrote to memory of 1904 2004 cmd.exe 147 PID 2004 wrote to memory of 2308 2004 cmd.exe 148 PID 2004 wrote to memory of 2308 2004 cmd.exe 148 PID 2004 wrote to memory of 2308 2004 cmd.exe 148 PID 2004 wrote to memory of 3088 2004 cmd.exe 149 PID 2004 wrote to memory of 3088 2004 cmd.exe 149 PID 2004 wrote to memory of 3088 2004 cmd.exe 149 PID 2004 wrote to memory of 2976 2004 cmd.exe 150 PID 2004 wrote to memory of 2976 2004 cmd.exe 150 PID 2004 wrote to memory of 2976 2004 cmd.exe 150 PID 2004 wrote to memory of 4420 2004 cmd.exe 151 PID 2004 wrote to memory of 4420 2004 cmd.exe 151 PID 2004 wrote to memory of 4420 2004 cmd.exe 151 PID 2004 wrote to memory of 4836 2004 cmd.exe 152 PID 2004 wrote to memory of 4836 2004 cmd.exe 152 PID 2004 wrote to memory of 4836 2004 cmd.exe 152 PID 5084 wrote to memory of 3276 5084 v1691462.exe 159 PID 5084 wrote to memory of 3276 5084 v1691462.exe 159 PID 5084 wrote to memory of 3276 5084 v1691462.exe 159 PID 3276 wrote to memory of 3392 3276 e2746600.exe 160 PID 3276 wrote to memory of 3392 3276 e2746600.exe 160 PID 3276 wrote to memory of 3392 3276 e2746600.exe 160 PID 4980 wrote to memory of 2576 4980 78766864342f8194ad3d4357996cba7a0eafbb1329a080fc5068a7bf1037c556.exe 163 PID 4980 wrote to memory of 2576 4980 78766864342f8194ad3d4357996cba7a0eafbb1329a080fc5068a7bf1037c556.exe 163 PID 4980 wrote to memory of 2576 4980 78766864342f8194ad3d4357996cba7a0eafbb1329a080fc5068a7bf1037c556.exe 163 PID 2580 wrote to memory of 1664 2580 oneetx.exe 168 PID 2580 wrote to memory of 1664 2580 oneetx.exe 168 PID 2580 wrote to memory of 1664 2580 oneetx.exe 168
Processes
-
C:\Users\Admin\AppData\Local\Temp\78766864342f8194ad3d4357996cba7a0eafbb1329a080fc5068a7bf1037c556.exe"C:\Users\Admin\AppData\Local\Temp\78766864342f8194ad3d4357996cba7a0eafbb1329a080fc5068a7bf1037c556.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1691462.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1691462.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4662436.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4662436.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3745064.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3745064.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5781171.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5781171.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1555321.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1555321.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 10847⤵
- Program crash
PID:2936
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8805847.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8805847.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8003081.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8003081.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 6966⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 7806⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 8566⤵
- Program crash
PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 8606⤵
- Program crash
PID:3408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 9686⤵
- Program crash
PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 9686⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 12126⤵
- Program crash
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 12446⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 13206⤵
- Program crash
PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 6927⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 8207⤵
- Program crash
PID:260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 9167⤵
- Program crash
PID:2792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 10527⤵
- Program crash
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 10607⤵
- Program crash
PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 10607⤵
- Program crash
PID:1840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 11207⤵
- Program crash
PID:3476
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 10007⤵
- Program crash
PID:2464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 7647⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1904
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:2308
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:3088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:4420
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:4836
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 13167⤵
- Program crash
PID:2924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 12887⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 13167⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 12807⤵
- Program crash
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 11327⤵
- Program crash
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 16247⤵
- Program crash
PID:2804
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 11327⤵
- Program crash
PID:1240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 16407⤵
- Program crash
PID:3340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 7486⤵
- Program crash
PID:4328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d7089178.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d7089178.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e2746600.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e2746600.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 13724⤵
- Program crash
PID:3828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6713358.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6713358.exe2⤵
- Executes dropped EXE
PID:2576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1124 -ip 11241⤵PID:1356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5052 -ip 50521⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5052 -ip 50521⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5052 -ip 50521⤵PID:4772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5052 -ip 50521⤵PID:1244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5052 -ip 50521⤵PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5052 -ip 50521⤵PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5052 -ip 50521⤵PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5052 -ip 50521⤵PID:3372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5052 -ip 50521⤵PID:536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5052 -ip 50521⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2580 -ip 25801⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2580 -ip 25801⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2580 -ip 25801⤵PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2580 -ip 25801⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2580 -ip 25801⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2580 -ip 25801⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2580 -ip 25801⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2580 -ip 25801⤵PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2580 -ip 25801⤵PID:4612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2580 -ip 25801⤵PID:1072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2580 -ip 25801⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2580 -ip 25801⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2580 -ip 25801⤵PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3276 -ip 32761⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2580 -ip 25801⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2580 -ip 25801⤵PID:3348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2580 -ip 25801⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 3122⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4808 -ip 48081⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2580 -ip 25801⤵PID:3852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD50ef4c39d5bfefe98806f2a7a0665286b
SHA103af9acd66749d6030cceddbc99abd099200e846
SHA2568389b68cbde3834e3137808a67d028e69a4e39c17916cb22c36a716be312c2db
SHA5121ea77e9c84a9bec83319a913a51b35ecb4f5fdc34e0cada27b326926393b2e06870c8d289b520dc612824706768b3482ba4d74d8fbe3ed32e236870e55617657
-
Filesize
206KB
MD50ef4c39d5bfefe98806f2a7a0665286b
SHA103af9acd66749d6030cceddbc99abd099200e846
SHA2568389b68cbde3834e3137808a67d028e69a4e39c17916cb22c36a716be312c2db
SHA5121ea77e9c84a9bec83319a913a51b35ecb4f5fdc34e0cada27b326926393b2e06870c8d289b520dc612824706768b3482ba4d74d8fbe3ed32e236870e55617657
-
Filesize
1.4MB
MD5c4d77d45b84917547802bf462dd8814e
SHA1b588121617f90bde914c7ba3f13d384e4d6b8ad1
SHA256d5c52fa0c5b2156bffc964767457d2f0ae9cf790c1906fae44a4387037b1f1cd
SHA512c3477557d4ebdd5be8122697b1182c0dd7e87a805df3c1c08b5f952836f022198572d1b7865633b3a63eebab619ffa9619df26ada524e523361c4b7adcd57626
-
Filesize
1.4MB
MD5c4d77d45b84917547802bf462dd8814e
SHA1b588121617f90bde914c7ba3f13d384e4d6b8ad1
SHA256d5c52fa0c5b2156bffc964767457d2f0ae9cf790c1906fae44a4387037b1f1cd
SHA512c3477557d4ebdd5be8122697b1182c0dd7e87a805df3c1c08b5f952836f022198572d1b7865633b3a63eebab619ffa9619df26ada524e523361c4b7adcd57626
-
Filesize
548KB
MD575bee541e8d937d773be116d3694538c
SHA1bbcb60ce0fbada5e09c88bac763b09aa92a83eb4
SHA2567528254d0a5740fdf8fef17b083b7cac31082827f6e27344f35bb3b76009799e
SHA512a524b12170a8a5f8c104e1324897ba732fd733615dfd8dc3df53bfee64958fe218e3af6fdedc79cf8a3ebcc36d9a97717a3d8c60bc1404054bd0cabbdd999a56
-
Filesize
548KB
MD575bee541e8d937d773be116d3694538c
SHA1bbcb60ce0fbada5e09c88bac763b09aa92a83eb4
SHA2567528254d0a5740fdf8fef17b083b7cac31082827f6e27344f35bb3b76009799e
SHA512a524b12170a8a5f8c104e1324897ba732fd733615dfd8dc3df53bfee64958fe218e3af6fdedc79cf8a3ebcc36d9a97717a3d8c60bc1404054bd0cabbdd999a56
-
Filesize
915KB
MD5938ceee62731afcd4c046db3e44b2700
SHA1f355c240b84fa863030d48229735a510cf0b446f
SHA25695431385f7792a3ead5f9af964e731073d3ddc7f42b50de2fb0c476b64703dbb
SHA5123221345219d59bd7950a1d5a06f4db4fe54a393faddac0f0f899d793cf4c463022a9df5e6cbff2bfa0660762b301aa06310a7a1449029765cabcedf39672fce0
-
Filesize
915KB
MD5938ceee62731afcd4c046db3e44b2700
SHA1f355c240b84fa863030d48229735a510cf0b446f
SHA25695431385f7792a3ead5f9af964e731073d3ddc7f42b50de2fb0c476b64703dbb
SHA5123221345219d59bd7950a1d5a06f4db4fe54a393faddac0f0f899d793cf4c463022a9df5e6cbff2bfa0660762b301aa06310a7a1449029765cabcedf39672fce0
-
Filesize
179KB
MD52cda6e43ddb5fb4297b42099288c5d72
SHA1e27504f51daeed78ab5c33b597489961ee959a4f
SHA256aab40aaa9d588d95d5a88894e8d022f51ca918aef4a3b9ccd7ea00a2431fac15
SHA51218c9f5901c447adae6d2bf1ba728441eb6164404c0aa85d325c66a37cbb2f923c4e0f67ca991f156ef3edd74446da1e2607bd48b797115ea50934c3dc8319b93
-
Filesize
179KB
MD52cda6e43ddb5fb4297b42099288c5d72
SHA1e27504f51daeed78ab5c33b597489961ee959a4f
SHA256aab40aaa9d588d95d5a88894e8d022f51ca918aef4a3b9ccd7ea00a2431fac15
SHA51218c9f5901c447adae6d2bf1ba728441eb6164404c0aa85d325c66a37cbb2f923c4e0f67ca991f156ef3edd74446da1e2607bd48b797115ea50934c3dc8319b93
-
Filesize
711KB
MD5111251019fce4cfc766d28dfbadeda4a
SHA1337aceb1e39c3562574394207069f13bc1bcd0c9
SHA2565d9e227f877427ea5bf18a289c7366781c1590d64d2abbda5590335d6ace68ea
SHA512143a9a99928af9986e05e2fc92443df64dc5319d69ecca40d0ddddc19bd56f35c9a509e47f7a5358880b4f2fcd092fe6421f53235456a5bf8e91b7f7645821c2
-
Filesize
711KB
MD5111251019fce4cfc766d28dfbadeda4a
SHA1337aceb1e39c3562574394207069f13bc1bcd0c9
SHA2565d9e227f877427ea5bf18a289c7366781c1590d64d2abbda5590335d6ace68ea
SHA512143a9a99928af9986e05e2fc92443df64dc5319d69ecca40d0ddddc19bd56f35c9a509e47f7a5358880b4f2fcd092fe6421f53235456a5bf8e91b7f7645821c2
-
Filesize
349KB
MD538f397f3b869ee326348df58d0e6c0b8
SHA1b15e737f77f6d253526cd7d722de433004e61c88
SHA256f0a8c5ff852c0b811bdb06780ff3cc6531264f688bae927dbe0f6329e49eb4f5
SHA512ba656b81cc8885495f0e1f9587f27533a0f3900c412700ce8544bf06e29bf7eed8ef5d786f51715f732152192f373513dcf932c60e4a7c7940b405a5cdc20464
-
Filesize
349KB
MD538f397f3b869ee326348df58d0e6c0b8
SHA1b15e737f77f6d253526cd7d722de433004e61c88
SHA256f0a8c5ff852c0b811bdb06780ff3cc6531264f688bae927dbe0f6329e49eb4f5
SHA512ba656b81cc8885495f0e1f9587f27533a0f3900c412700ce8544bf06e29bf7eed8ef5d786f51715f732152192f373513dcf932c60e4a7c7940b405a5cdc20464
-
Filesize
416KB
MD5d091f45f742e1d6aea9f9c9f3a5be6ad
SHA129cb2a6e660b6e1ab81d244902e9a630cd9004be
SHA256e8157b2fd88635f825dde98a594b722eb355c558cd2c77d7c79b9c7e5e0a142c
SHA512d485e4e9830b18c1e5f895915281cbfd7bc0754bea9649befb9cecfd277ea35abd758772747c0eb39efe62a8bfb07644ce7393219302970c5095993335aecae0
-
Filesize
416KB
MD5d091f45f742e1d6aea9f9c9f3a5be6ad
SHA129cb2a6e660b6e1ab81d244902e9a630cd9004be
SHA256e8157b2fd88635f825dde98a594b722eb355c558cd2c77d7c79b9c7e5e0a142c
SHA512d485e4e9830b18c1e5f895915281cbfd7bc0754bea9649befb9cecfd277ea35abd758772747c0eb39efe62a8bfb07644ce7393219302970c5095993335aecae0
-
Filesize
360KB
MD50079798da8754c98ad60eb6025682895
SHA142b94dcec69f1995ea871f6af97ea34d7bae6ffe
SHA256953f6150935e3003e6ec8200fb489e1c67d07dd90598299d20236c77af932890
SHA512e13ef083c12e11b6cb8a824beb990ecdd37e54d38ed2193ef7cff10ea17b1862b94f4722dcdf2f53c2f535c6cfc5549be0cd2d8b37a8a9071981aa8c072ed12f
-
Filesize
360KB
MD50079798da8754c98ad60eb6025682895
SHA142b94dcec69f1995ea871f6af97ea34d7bae6ffe
SHA256953f6150935e3003e6ec8200fb489e1c67d07dd90598299d20236c77af932890
SHA512e13ef083c12e11b6cb8a824beb990ecdd37e54d38ed2193ef7cff10ea17b1862b94f4722dcdf2f53c2f535c6cfc5549be0cd2d8b37a8a9071981aa8c072ed12f
-
Filesize
168KB
MD565fd2e2afe8e4b067677274e0e09691e
SHA1fe81a10285ac52bc0ae9a779633b5d6411bdb5c6
SHA256c0f69d407122504285cb912e10005ecaeaa136cf32d6a5243a5da87d532fc6a3
SHA512083a117cadd93a13902d6597ecbde41bf11f1bf497c6bd7270febd5b6596563a9fc9f11d89a9952d68b5eeb11619b1a2f2f3b2737c56a51dcd5b6cd508ed00aa
-
Filesize
168KB
MD565fd2e2afe8e4b067677274e0e09691e
SHA1fe81a10285ac52bc0ae9a779633b5d6411bdb5c6
SHA256c0f69d407122504285cb912e10005ecaeaa136cf32d6a5243a5da87d532fc6a3
SHA512083a117cadd93a13902d6597ecbde41bf11f1bf497c6bd7270febd5b6596563a9fc9f11d89a9952d68b5eeb11619b1a2f2f3b2737c56a51dcd5b6cd508ed00aa
-
Filesize
349KB
MD538f397f3b869ee326348df58d0e6c0b8
SHA1b15e737f77f6d253526cd7d722de433004e61c88
SHA256f0a8c5ff852c0b811bdb06780ff3cc6531264f688bae927dbe0f6329e49eb4f5
SHA512ba656b81cc8885495f0e1f9587f27533a0f3900c412700ce8544bf06e29bf7eed8ef5d786f51715f732152192f373513dcf932c60e4a7c7940b405a5cdc20464
-
Filesize
349KB
MD538f397f3b869ee326348df58d0e6c0b8
SHA1b15e737f77f6d253526cd7d722de433004e61c88
SHA256f0a8c5ff852c0b811bdb06780ff3cc6531264f688bae927dbe0f6329e49eb4f5
SHA512ba656b81cc8885495f0e1f9587f27533a0f3900c412700ce8544bf06e29bf7eed8ef5d786f51715f732152192f373513dcf932c60e4a7c7940b405a5cdc20464
-
Filesize
349KB
MD538f397f3b869ee326348df58d0e6c0b8
SHA1b15e737f77f6d253526cd7d722de433004e61c88
SHA256f0a8c5ff852c0b811bdb06780ff3cc6531264f688bae927dbe0f6329e49eb4f5
SHA512ba656b81cc8885495f0e1f9587f27533a0f3900c412700ce8544bf06e29bf7eed8ef5d786f51715f732152192f373513dcf932c60e4a7c7940b405a5cdc20464
-
Filesize
349KB
MD538f397f3b869ee326348df58d0e6c0b8
SHA1b15e737f77f6d253526cd7d722de433004e61c88
SHA256f0a8c5ff852c0b811bdb06780ff3cc6531264f688bae927dbe0f6329e49eb4f5
SHA512ba656b81cc8885495f0e1f9587f27533a0f3900c412700ce8544bf06e29bf7eed8ef5d786f51715f732152192f373513dcf932c60e4a7c7940b405a5cdc20464
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b