Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
f4a5abb342bbd19112046d8a7dce617706ce9a0f0da36b3120f48e7727d96d26.exe
Resource
win10v2004-20230220-en
General
-
Target
f4a5abb342bbd19112046d8a7dce617706ce9a0f0da36b3120f48e7727d96d26.exe
-
Size
1.5MB
-
MD5
a675a53dfc38d70987f7e3bc4d88d133
-
SHA1
e185f4074bf72ab1706f2771011e61278d390609
-
SHA256
f4a5abb342bbd19112046d8a7dce617706ce9a0f0da36b3120f48e7727d96d26
-
SHA512
9d3771b8b19c530f33af0b2657963eaf2d33c6d206f39a86aa3864cc1566db71035773d2df52ab5ce44bdf4e9f0c4b55ceea232231467776b37bdadda0d18199
-
SSDEEP
24576:HyQ7XRRx7HKy0ANJTQcQDxX+Z1m8VU+pgqJEWCmEjb7TR5TQAN:SQtT50ChQc09+dUcVEW0f7TR5U
Malware Config
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3564831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d1029080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d1029080.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3564831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3564831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3564831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d1029080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d1029080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d1029080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3564831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3564831.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation e8663103.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation c7699985.exe -
Executes dropped EXE 14 IoCs
pid Process 2264 v4465103.exe 4180 v5358505.exe 1840 v4560531.exe 3828 v6563183.exe 2544 a3564831.exe 3764 b3000723.exe 532 c7699985.exe 2204 oneetx.exe 3408 d1029080.exe 4252 e8663103.exe 1508 1.exe 3784 f3136222.exe 4784 oneetx.exe 3828 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2252 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3564831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3564831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d1029080.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f4a5abb342bbd19112046d8a7dce617706ce9a0f0da36b3120f48e7727d96d26.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f4a5abb342bbd19112046d8a7dce617706ce9a0f0da36b3120f48e7727d96d26.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4465103.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5358505.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4560531.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6563183.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4465103.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5358505.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4560531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v6563183.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
pid pid_target Process procid_target 3128 2544 WerFault.exe 89 4560 532 WerFault.exe 96 1460 532 WerFault.exe 96 1924 532 WerFault.exe 96 4256 532 WerFault.exe 96 4664 532 WerFault.exe 96 5068 532 WerFault.exe 96 816 532 WerFault.exe 96 3124 532 WerFault.exe 96 4608 532 WerFault.exe 96 408 532 WerFault.exe 96 1508 2204 WerFault.exe 115 1564 2204 WerFault.exe 115 4676 2204 WerFault.exe 115 2480 2204 WerFault.exe 115 3952 2204 WerFault.exe 115 4432 2204 WerFault.exe 115 3664 2204 WerFault.exe 115 872 2204 WerFault.exe 115 4972 2204 WerFault.exe 115 2224 2204 WerFault.exe 115 1336 2204 WerFault.exe 115 1460 2204 WerFault.exe 115 1924 2204 WerFault.exe 115 2108 4252 WerFault.exe 159 2836 2204 WerFault.exe 115 4840 4784 WerFault.exe 167 4972 2204 WerFault.exe 115 2760 2204 WerFault.exe 115 4660 2204 WerFault.exe 115 1336 3828 WerFault.exe 177 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2592 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2544 a3564831.exe 2544 a3564831.exe 3764 b3000723.exe 3764 b3000723.exe 3408 d1029080.exe 3408 d1029080.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2544 a3564831.exe Token: SeDebugPrivilege 3764 b3000723.exe Token: SeDebugPrivilege 3408 d1029080.exe Token: SeDebugPrivilege 4252 e8663103.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 532 c7699985.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4176 wrote to memory of 2264 4176 f4a5abb342bbd19112046d8a7dce617706ce9a0f0da36b3120f48e7727d96d26.exe 85 PID 4176 wrote to memory of 2264 4176 f4a5abb342bbd19112046d8a7dce617706ce9a0f0da36b3120f48e7727d96d26.exe 85 PID 4176 wrote to memory of 2264 4176 f4a5abb342bbd19112046d8a7dce617706ce9a0f0da36b3120f48e7727d96d26.exe 85 PID 2264 wrote to memory of 4180 2264 v4465103.exe 86 PID 2264 wrote to memory of 4180 2264 v4465103.exe 86 PID 2264 wrote to memory of 4180 2264 v4465103.exe 86 PID 4180 wrote to memory of 1840 4180 v5358505.exe 87 PID 4180 wrote to memory of 1840 4180 v5358505.exe 87 PID 4180 wrote to memory of 1840 4180 v5358505.exe 87 PID 1840 wrote to memory of 3828 1840 v4560531.exe 88 PID 1840 wrote to memory of 3828 1840 v4560531.exe 88 PID 1840 wrote to memory of 3828 1840 v4560531.exe 88 PID 3828 wrote to memory of 2544 3828 v6563183.exe 89 PID 3828 wrote to memory of 2544 3828 v6563183.exe 89 PID 3828 wrote to memory of 2544 3828 v6563183.exe 89 PID 3828 wrote to memory of 3764 3828 v6563183.exe 95 PID 3828 wrote to memory of 3764 3828 v6563183.exe 95 PID 3828 wrote to memory of 3764 3828 v6563183.exe 95 PID 1840 wrote to memory of 532 1840 v4560531.exe 96 PID 1840 wrote to memory of 532 1840 v4560531.exe 96 PID 1840 wrote to memory of 532 1840 v4560531.exe 96 PID 532 wrote to memory of 2204 532 c7699985.exe 115 PID 532 wrote to memory of 2204 532 c7699985.exe 115 PID 532 wrote to memory of 2204 532 c7699985.exe 115 PID 4180 wrote to memory of 3408 4180 v5358505.exe 121 PID 4180 wrote to memory of 3408 4180 v5358505.exe 121 PID 4180 wrote to memory of 3408 4180 v5358505.exe 121 PID 2204 wrote to memory of 2592 2204 oneetx.exe 134 PID 2204 wrote to memory of 2592 2204 oneetx.exe 134 PID 2204 wrote to memory of 2592 2204 oneetx.exe 134 PID 2204 wrote to memory of 1724 2204 oneetx.exe 140 PID 2204 wrote to memory of 1724 2204 oneetx.exe 140 PID 2204 wrote to memory of 1724 2204 oneetx.exe 140 PID 1724 wrote to memory of 4332 1724 cmd.exe 144 PID 1724 wrote to memory of 4332 1724 cmd.exe 144 PID 1724 wrote to memory of 4332 1724 cmd.exe 144 PID 1724 wrote to memory of 4540 1724 cmd.exe 145 PID 1724 wrote to memory of 4540 1724 cmd.exe 145 PID 1724 wrote to memory of 4540 1724 cmd.exe 145 PID 1724 wrote to memory of 4976 1724 cmd.exe 146 PID 1724 wrote to memory of 4976 1724 cmd.exe 146 PID 1724 wrote to memory of 4976 1724 cmd.exe 146 PID 1724 wrote to memory of 984 1724 cmd.exe 147 PID 1724 wrote to memory of 984 1724 cmd.exe 147 PID 1724 wrote to memory of 984 1724 cmd.exe 147 PID 1724 wrote to memory of 840 1724 cmd.exe 148 PID 1724 wrote to memory of 840 1724 cmd.exe 148 PID 1724 wrote to memory of 840 1724 cmd.exe 148 PID 1724 wrote to memory of 1248 1724 cmd.exe 149 PID 1724 wrote to memory of 1248 1724 cmd.exe 149 PID 1724 wrote to memory of 1248 1724 cmd.exe 149 PID 2264 wrote to memory of 4252 2264 v4465103.exe 159 PID 2264 wrote to memory of 4252 2264 v4465103.exe 159 PID 2264 wrote to memory of 4252 2264 v4465103.exe 159 PID 4252 wrote to memory of 1508 4252 e8663103.exe 161 PID 4252 wrote to memory of 1508 4252 e8663103.exe 161 PID 4252 wrote to memory of 1508 4252 e8663103.exe 161 PID 4176 wrote to memory of 3784 4176 f4a5abb342bbd19112046d8a7dce617706ce9a0f0da36b3120f48e7727d96d26.exe 164 PID 4176 wrote to memory of 3784 4176 f4a5abb342bbd19112046d8a7dce617706ce9a0f0da36b3120f48e7727d96d26.exe 164 PID 4176 wrote to memory of 3784 4176 f4a5abb342bbd19112046d8a7dce617706ce9a0f0da36b3120f48e7727d96d26.exe 164 PID 2204 wrote to memory of 2252 2204 oneetx.exe 172 PID 2204 wrote to memory of 2252 2204 oneetx.exe 172 PID 2204 wrote to memory of 2252 2204 oneetx.exe 172
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4a5abb342bbd19112046d8a7dce617706ce9a0f0da36b3120f48e7727d96d26.exe"C:\Users\Admin\AppData\Local\Temp\f4a5abb342bbd19112046d8a7dce617706ce9a0f0da36b3120f48e7727d96d26.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4465103.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4465103.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5358505.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5358505.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4560531.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4560531.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6563183.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6563183.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3564831.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3564831.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 10847⤵
- Program crash
PID:3128
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3000723.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3000723.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7699985.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7699985.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 6966⤵
- Program crash
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 7526⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 8566⤵
- Program crash
PID:1924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 9526⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 9526⤵
- Program crash
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 9886⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 12206⤵
- Program crash
PID:816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 12086⤵
- Program crash
PID:3124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 13166⤵
- Program crash
PID:4608
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 6927⤵
- Program crash
PID:1508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 8647⤵
- Program crash
PID:1564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 9127⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 10527⤵
- Program crash
PID:2480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 10727⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 10727⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 11087⤵
- Program crash
PID:3664
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:2592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 9927⤵
- Program crash
PID:872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 7847⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:4540
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:4976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:984
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:840
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:1248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 13087⤵
- Program crash
PID:2224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 7287⤵
- Program crash
PID:1336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 7727⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 13527⤵
- Program crash
PID:1924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 10527⤵
- Program crash
PID:2836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 16127⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 7647⤵
- Program crash
PID:2760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 16287⤵
- Program crash
PID:4660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 13166⤵
- Program crash
PID:408
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d1029080.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d1029080.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e8663103.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e8663103.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:1508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 13764⤵
- Program crash
PID:2108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f3136222.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f3136222.exe2⤵
- Executes dropped EXE
PID:3784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2544 -ip 25441⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 532 -ip 5321⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 532 -ip 5321⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 532 -ip 5321⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 532 -ip 5321⤵PID:892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 532 -ip 5321⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 532 -ip 5321⤵PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 532 -ip 5321⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 532 -ip 5321⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 532 -ip 5321⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 532 -ip 5321⤵PID:3864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2204 -ip 22041⤵PID:2716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2204 -ip 22041⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2204 -ip 22041⤵PID:2748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2204 -ip 22041⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2204 -ip 22041⤵PID:2836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2204 -ip 22041⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2204 -ip 22041⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2204 -ip 22041⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2204 -ip 22041⤵PID:3128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2204 -ip 22041⤵PID:4264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2204 -ip 22041⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2204 -ip 22041⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2204 -ip 22041⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4252 -ip 42521⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2204 -ip 22041⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 3162⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4784 -ip 47841⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2204 -ip 22041⤵PID:3128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2204 -ip 22041⤵PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2204 -ip 22041⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 3202⤵
- Program crash
PID:1336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3828 -ip 38281⤵PID:960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD505eab91736e8439b7483ae7d486de405
SHA17f0b2deff7b52971f008a80971dfa97c6178aaf9
SHA256434715a13023c773bf299b3cd21f65c8b1fe7501817a1e5e0a66ee7f52498032
SHA51298a257389032106e6eb1312ed202a0f814c11a6ef20c5d850eb045ffc1f10ee64890a614fb226cb2d7f7828bc9d7dc25df421f12e0ebc4ea4f2aa0c8428d0336
-
Filesize
204KB
MD505eab91736e8439b7483ae7d486de405
SHA17f0b2deff7b52971f008a80971dfa97c6178aaf9
SHA256434715a13023c773bf299b3cd21f65c8b1fe7501817a1e5e0a66ee7f52498032
SHA51298a257389032106e6eb1312ed202a0f814c11a6ef20c5d850eb045ffc1f10ee64890a614fb226cb2d7f7828bc9d7dc25df421f12e0ebc4ea4f2aa0c8428d0336
-
Filesize
1.4MB
MD503eff90da4911845bb460a51f38ccf70
SHA1b4347055d3a29f536573597d1e65821af6aeca7b
SHA2569d46f50615c3fdc00d3a539aed910502e0c3689ff725e231d4165a2fa3dfc949
SHA5127b6fc7edc836680ca66cadedb05acbe5523a3f9da7b8cc03efd7d430fed8d76f2f2be670ccf3bb533567921fb6c64120faa4794e54249bc64903d62822e5389f
-
Filesize
1.4MB
MD503eff90da4911845bb460a51f38ccf70
SHA1b4347055d3a29f536573597d1e65821af6aeca7b
SHA2569d46f50615c3fdc00d3a539aed910502e0c3689ff725e231d4165a2fa3dfc949
SHA5127b6fc7edc836680ca66cadedb05acbe5523a3f9da7b8cc03efd7d430fed8d76f2f2be670ccf3bb533567921fb6c64120faa4794e54249bc64903d62822e5389f
-
Filesize
548KB
MD53436e547d3015911f54e68e0cf87e06a
SHA15b1e36c622cffede9793ea219f831ad1fe167fd2
SHA256b884605288234eb339c02e9f07da202bef48d2fdab0b42786deaa742d808e360
SHA5120d8c1388ae845517f7e21309fa0a193b5a958a15477c28451cc8db58f396418ea89b990840971ff3b3829662804c3e325ca84cfc2667067e83628f104a71f29c
-
Filesize
548KB
MD53436e547d3015911f54e68e0cf87e06a
SHA15b1e36c622cffede9793ea219f831ad1fe167fd2
SHA256b884605288234eb339c02e9f07da202bef48d2fdab0b42786deaa742d808e360
SHA5120d8c1388ae845517f7e21309fa0a193b5a958a15477c28451cc8db58f396418ea89b990840971ff3b3829662804c3e325ca84cfc2667067e83628f104a71f29c
-
Filesize
912KB
MD5aebd029b36719e19cc86e08177119a93
SHA1f60ea890388e41f168d22d011e5dd2048530a736
SHA256a15de82f71a86e5de0fdb3c2d948606fe81d281886ce04d76d00dcbb75f03765
SHA512266bbffad63c934147924a28cc2be64bc184e374da364af20d855e5a366fa3bbb1595ab283ac8a2b9a279a01bd93464f8178f479f752122d69b7e26badbc9043
-
Filesize
912KB
MD5aebd029b36719e19cc86e08177119a93
SHA1f60ea890388e41f168d22d011e5dd2048530a736
SHA256a15de82f71a86e5de0fdb3c2d948606fe81d281886ce04d76d00dcbb75f03765
SHA512266bbffad63c934147924a28cc2be64bc184e374da364af20d855e5a366fa3bbb1595ab283ac8a2b9a279a01bd93464f8178f479f752122d69b7e26badbc9043
-
Filesize
175KB
MD510ba71bbe04c4843d2e9544a16f88209
SHA1288a4424abea502d6cf7552748c1dcab247a6705
SHA2560034b196b132feae41eb246ffd1f1bfbed0089a0540759a8106c2993770260e3
SHA512126cde808bb7105282581afbc7a9ef90312074def037e1dfcc99b2d9d8949a99cd92e206ff2757d3e354b16e6b6872704c12f579794860a38be97ab1dcd50b42
-
Filesize
175KB
MD510ba71bbe04c4843d2e9544a16f88209
SHA1288a4424abea502d6cf7552748c1dcab247a6705
SHA2560034b196b132feae41eb246ffd1f1bfbed0089a0540759a8106c2993770260e3
SHA512126cde808bb7105282581afbc7a9ef90312074def037e1dfcc99b2d9d8949a99cd92e206ff2757d3e354b16e6b6872704c12f579794860a38be97ab1dcd50b42
-
Filesize
708KB
MD5980a7daba42754d5688fdb62312a69ea
SHA1818f933482428d95314f0660a94ef8674a1dbda8
SHA2569328d1ac73b7ca7097137c524696b5ca8310a12c0890aa044b2b5b2630e1246f
SHA5121bd2e2b3313ad0b10e78d5eeaa54a9fe1de6aaf6883ca38ac77873e6f17a86cdcb2eeb9936fbb5fd8128c81aead0f022fd0cb5e3fb54affe0dcd25ffb3041784
-
Filesize
708KB
MD5980a7daba42754d5688fdb62312a69ea
SHA1818f933482428d95314f0660a94ef8674a1dbda8
SHA2569328d1ac73b7ca7097137c524696b5ca8310a12c0890aa044b2b5b2630e1246f
SHA5121bd2e2b3313ad0b10e78d5eeaa54a9fe1de6aaf6883ca38ac77873e6f17a86cdcb2eeb9936fbb5fd8128c81aead0f022fd0cb5e3fb54affe0dcd25ffb3041784
-
Filesize
340KB
MD5b47ca13c2d8292660c589a2f4732160c
SHA1583949e6c450d0c3d15c621c168277a9937477c6
SHA256134cba2b11ae7bf318fcf52183d165e1a39b258c9ef430230e1a76f0e97df0f4
SHA512a21b2233a85bddce1deb9990300342efce7d163d7cfd22608b1ee6b9d02bfd355855168a5b56b9624ef59d66fd0b372373bd41ca535b1d5cf80cdb3e6c306147
-
Filesize
340KB
MD5b47ca13c2d8292660c589a2f4732160c
SHA1583949e6c450d0c3d15c621c168277a9937477c6
SHA256134cba2b11ae7bf318fcf52183d165e1a39b258c9ef430230e1a76f0e97df0f4
SHA512a21b2233a85bddce1deb9990300342efce7d163d7cfd22608b1ee6b9d02bfd355855168a5b56b9624ef59d66fd0b372373bd41ca535b1d5cf80cdb3e6c306147
-
Filesize
417KB
MD5a9f55ec3abed583cd3fc7962658634e0
SHA18cd0d0b1c90d047db511c41e661d12f00576c95f
SHA2569f5b4e954bea253a645d37942e33cf5d6eabeb202248acd5f8b540cd954b64bd
SHA512ea35902bd81aa1acbfeedbd43233e3f08c3abc4489b06c92c3b2e228d67e2bfa928d5d68ec7295e3d9fbcddf773f925aef9888b72572846a493175d4c829b898
-
Filesize
417KB
MD5a9f55ec3abed583cd3fc7962658634e0
SHA18cd0d0b1c90d047db511c41e661d12f00576c95f
SHA2569f5b4e954bea253a645d37942e33cf5d6eabeb202248acd5f8b540cd954b64bd
SHA512ea35902bd81aa1acbfeedbd43233e3f08c3abc4489b06c92c3b2e228d67e2bfa928d5d68ec7295e3d9fbcddf773f925aef9888b72572846a493175d4c829b898
-
Filesize
360KB
MD556347ee89402934913fbb986d56fc0da
SHA1f57404e77597e5e0d34b48b54b28502287489dc5
SHA25662dd2532a722f326a7693ec6dc468300939cd2dd6aa06b52a7bf0b1926493791
SHA5122a2030ffb1bb5984d2db3a7393adf34d35a6bd10e734709782cb2d7ea1d1d7182b6aeea053f0a23ffd523318d6c2afdfd97b9291af1d0e3abeac6d33880fa03d
-
Filesize
360KB
MD556347ee89402934913fbb986d56fc0da
SHA1f57404e77597e5e0d34b48b54b28502287489dc5
SHA25662dd2532a722f326a7693ec6dc468300939cd2dd6aa06b52a7bf0b1926493791
SHA5122a2030ffb1bb5984d2db3a7393adf34d35a6bd10e734709782cb2d7ea1d1d7182b6aeea053f0a23ffd523318d6c2afdfd97b9291af1d0e3abeac6d33880fa03d
-
Filesize
136KB
MD5d9a5bf35ac65a542c7ba76c88151c4b5
SHA1c3e86c6abb92540e660fe54156dc4ee9ce6cc698
SHA2561712a5e3a2bf9c22e28b7b5d8fde8987eda18ad8513f88d35328b54ea415e984
SHA512ea9da8ad67a9814805c5a0b656b5c0eba918a7b1ba7a5334ddd7170d165a66f9456a77d40beda494440afb22bb2982114ddb9d368a653a8d684025dc2c349d58
-
Filesize
136KB
MD5d9a5bf35ac65a542c7ba76c88151c4b5
SHA1c3e86c6abb92540e660fe54156dc4ee9ce6cc698
SHA2561712a5e3a2bf9c22e28b7b5d8fde8987eda18ad8513f88d35328b54ea415e984
SHA512ea9da8ad67a9814805c5a0b656b5c0eba918a7b1ba7a5334ddd7170d165a66f9456a77d40beda494440afb22bb2982114ddb9d368a653a8d684025dc2c349d58
-
Filesize
340KB
MD5b47ca13c2d8292660c589a2f4732160c
SHA1583949e6c450d0c3d15c621c168277a9937477c6
SHA256134cba2b11ae7bf318fcf52183d165e1a39b258c9ef430230e1a76f0e97df0f4
SHA512a21b2233a85bddce1deb9990300342efce7d163d7cfd22608b1ee6b9d02bfd355855168a5b56b9624ef59d66fd0b372373bd41ca535b1d5cf80cdb3e6c306147
-
Filesize
340KB
MD5b47ca13c2d8292660c589a2f4732160c
SHA1583949e6c450d0c3d15c621c168277a9937477c6
SHA256134cba2b11ae7bf318fcf52183d165e1a39b258c9ef430230e1a76f0e97df0f4
SHA512a21b2233a85bddce1deb9990300342efce7d163d7cfd22608b1ee6b9d02bfd355855168a5b56b9624ef59d66fd0b372373bd41ca535b1d5cf80cdb3e6c306147
-
Filesize
340KB
MD5b47ca13c2d8292660c589a2f4732160c
SHA1583949e6c450d0c3d15c621c168277a9937477c6
SHA256134cba2b11ae7bf318fcf52183d165e1a39b258c9ef430230e1a76f0e97df0f4
SHA512a21b2233a85bddce1deb9990300342efce7d163d7cfd22608b1ee6b9d02bfd355855168a5b56b9624ef59d66fd0b372373bd41ca535b1d5cf80cdb3e6c306147
-
Filesize
340KB
MD5b47ca13c2d8292660c589a2f4732160c
SHA1583949e6c450d0c3d15c621c168277a9937477c6
SHA256134cba2b11ae7bf318fcf52183d165e1a39b258c9ef430230e1a76f0e97df0f4
SHA512a21b2233a85bddce1deb9990300342efce7d163d7cfd22608b1ee6b9d02bfd355855168a5b56b9624ef59d66fd0b372373bd41ca535b1d5cf80cdb3e6c306147
-
Filesize
340KB
MD5b47ca13c2d8292660c589a2f4732160c
SHA1583949e6c450d0c3d15c621c168277a9937477c6
SHA256134cba2b11ae7bf318fcf52183d165e1a39b258c9ef430230e1a76f0e97df0f4
SHA512a21b2233a85bddce1deb9990300342efce7d163d7cfd22608b1ee6b9d02bfd355855168a5b56b9624ef59d66fd0b372373bd41ca535b1d5cf80cdb3e6c306147
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b