Analysis
-
max time kernel
152s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:30
Static task
static1
Behavioral task
behavioral1
Sample
6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146.exe
Resource
win10v2004-20230220-en
General
-
Target
6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146.exe
-
Size
1.5MB
-
MD5
2981c1e1f026ec894e95ac4a23c284de
-
SHA1
d77cb3fb597854f86eaf501577bc83f0911e5f7e
-
SHA256
6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146
-
SHA512
ce11a7e4aa53c497135a79bd1240f2984ba604df20ca8fad055859ec2e1f798618c19a997e4306e5e04838ee4fd3825afaa025faba7d833f0d1538990103800b
-
SSDEEP
24576:SyAvoaGKdJjUrbJjeVptCXcJtK9s0otXStG6VLaF7piYK3yrT8fLkr1hwPDnjzuX:5Av6UWCVGXcJTteVmFUgT1erjzu
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4788-212-0x000000000AEC0000-0x000000000B4D8000-memory.dmp redline_stealer behavioral2/memory/4788-219-0x000000000AD60000-0x000000000ADC6000-memory.dmp redline_stealer behavioral2/memory/4788-222-0x000000000C480000-0x000000000C642000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d6300143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8291330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d6300143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d6300143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8291330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8291330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d6300143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d6300143.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8291330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8291330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8291330.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation c6092303.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation e5155471.exe -
Executes dropped EXE 13 IoCs
pid Process 2204 v2591459.exe 5032 v8912874.exe 2032 v8115981.exe 3760 v7443038.exe 4356 a8291330.exe 4788 b0314616.exe 4968 c6092303.exe 5112 oneetx.exe 3196 d6300143.exe 3900 e5155471.exe 1720 1.exe 4300 f6980579.exe 3712 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8291330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8291330.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d6300143.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2591459.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8912874.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8912874.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8115981.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2591459.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8115981.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7443038.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v7443038.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 27 IoCs
pid pid_target Process procid_target 4784 4356 WerFault.exe 88 4580 4968 WerFault.exe 93 3524 4968 WerFault.exe 93 4120 4968 WerFault.exe 93 3364 4968 WerFault.exe 93 3184 4968 WerFault.exe 93 4148 4968 WerFault.exe 93 4408 4968 WerFault.exe 93 4656 4968 WerFault.exe 93 4772 4968 WerFault.exe 93 4284 4968 WerFault.exe 93 1568 5112 WerFault.exe 112 5048 5112 WerFault.exe 112 3736 5112 WerFault.exe 112 1624 5112 WerFault.exe 112 4612 5112 WerFault.exe 112 4128 5112 WerFault.exe 112 4396 5112 WerFault.exe 112 4420 5112 WerFault.exe 112 424 5112 WerFault.exe 112 2628 5112 WerFault.exe 112 3844 5112 WerFault.exe 112 5076 5112 WerFault.exe 112 4880 3900 WerFault.exe 148 4588 5112 WerFault.exe 112 4356 3712 WerFault.exe 157 4748 5112 WerFault.exe 112 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4356 a8291330.exe 4356 a8291330.exe 4788 b0314616.exe 4788 b0314616.exe 3196 d6300143.exe 3196 d6300143.exe 1720 1.exe 1720 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4356 a8291330.exe Token: SeDebugPrivilege 4788 b0314616.exe Token: SeDebugPrivilege 3196 d6300143.exe Token: SeDebugPrivilege 3900 e5155471.exe Token: SeDebugPrivilege 1720 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4968 c6092303.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 4384 wrote to memory of 2204 4384 6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146.exe 84 PID 4384 wrote to memory of 2204 4384 6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146.exe 84 PID 4384 wrote to memory of 2204 4384 6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146.exe 84 PID 2204 wrote to memory of 5032 2204 v2591459.exe 85 PID 2204 wrote to memory of 5032 2204 v2591459.exe 85 PID 2204 wrote to memory of 5032 2204 v2591459.exe 85 PID 5032 wrote to memory of 2032 5032 v8912874.exe 86 PID 5032 wrote to memory of 2032 5032 v8912874.exe 86 PID 5032 wrote to memory of 2032 5032 v8912874.exe 86 PID 2032 wrote to memory of 3760 2032 v8115981.exe 87 PID 2032 wrote to memory of 3760 2032 v8115981.exe 87 PID 2032 wrote to memory of 3760 2032 v8115981.exe 87 PID 3760 wrote to memory of 4356 3760 v7443038.exe 88 PID 3760 wrote to memory of 4356 3760 v7443038.exe 88 PID 3760 wrote to memory of 4356 3760 v7443038.exe 88 PID 3760 wrote to memory of 4788 3760 v7443038.exe 92 PID 3760 wrote to memory of 4788 3760 v7443038.exe 92 PID 3760 wrote to memory of 4788 3760 v7443038.exe 92 PID 2032 wrote to memory of 4968 2032 v8115981.exe 93 PID 2032 wrote to memory of 4968 2032 v8115981.exe 93 PID 2032 wrote to memory of 4968 2032 v8115981.exe 93 PID 4968 wrote to memory of 5112 4968 c6092303.exe 112 PID 4968 wrote to memory of 5112 4968 c6092303.exe 112 PID 4968 wrote to memory of 5112 4968 c6092303.exe 112 PID 5032 wrote to memory of 3196 5032 v8912874.exe 119 PID 5032 wrote to memory of 3196 5032 v8912874.exe 119 PID 5032 wrote to memory of 3196 5032 v8912874.exe 119 PID 5112 wrote to memory of 2560 5112 oneetx.exe 130 PID 5112 wrote to memory of 2560 5112 oneetx.exe 130 PID 5112 wrote to memory of 2560 5112 oneetx.exe 130 PID 5112 wrote to memory of 4024 5112 oneetx.exe 136 PID 5112 wrote to memory of 4024 5112 oneetx.exe 136 PID 5112 wrote to memory of 4024 5112 oneetx.exe 136 PID 4024 wrote to memory of 872 4024 cmd.exe 140 PID 4024 wrote to memory of 872 4024 cmd.exe 140 PID 4024 wrote to memory of 872 4024 cmd.exe 140 PID 4024 wrote to memory of 4364 4024 cmd.exe 141 PID 4024 wrote to memory of 4364 4024 cmd.exe 141 PID 4024 wrote to memory of 4364 4024 cmd.exe 141 PID 4024 wrote to memory of 1804 4024 cmd.exe 142 PID 4024 wrote to memory of 1804 4024 cmd.exe 142 PID 4024 wrote to memory of 1804 4024 cmd.exe 142 PID 4024 wrote to memory of 2236 4024 cmd.exe 143 PID 4024 wrote to memory of 2236 4024 cmd.exe 143 PID 4024 wrote to memory of 2236 4024 cmd.exe 143 PID 4024 wrote to memory of 3764 4024 cmd.exe 144 PID 4024 wrote to memory of 3764 4024 cmd.exe 144 PID 4024 wrote to memory of 3764 4024 cmd.exe 144 PID 4024 wrote to memory of 4080 4024 cmd.exe 145 PID 4024 wrote to memory of 4080 4024 cmd.exe 145 PID 4024 wrote to memory of 4080 4024 cmd.exe 145 PID 2204 wrote to memory of 3900 2204 v2591459.exe 148 PID 2204 wrote to memory of 3900 2204 v2591459.exe 148 PID 2204 wrote to memory of 3900 2204 v2591459.exe 148 PID 3900 wrote to memory of 1720 3900 e5155471.exe 151 PID 3900 wrote to memory of 1720 3900 e5155471.exe 151 PID 3900 wrote to memory of 1720 3900 e5155471.exe 151 PID 4384 wrote to memory of 4300 4384 6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146.exe 156 PID 4384 wrote to memory of 4300 4384 6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146.exe 156 PID 4384 wrote to memory of 4300 4384 6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146.exe 156
Processes
-
C:\Users\Admin\AppData\Local\Temp\6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146.exe"C:\Users\Admin\AppData\Local\Temp\6febab6757b25e5a62f60cac19ada5210eda99668222b354224d40eb045cb146.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2591459.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2591459.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8912874.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8912874.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8115981.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8115981.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7443038.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7443038.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8291330.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8291330.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 10847⤵
- Program crash
PID:4784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0314616.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0314616.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6092303.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6092303.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 6966⤵
- Program crash
PID:4580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 7526⤵
- Program crash
PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 8566⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 9526⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 9766⤵
- Program crash
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 9766⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 12166⤵
- Program crash
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 12366⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 13126⤵
- Program crash
PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 6927⤵
- Program crash
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 8327⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 9127⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 10807⤵
- Program crash
PID:1624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 10287⤵
- Program crash
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 11167⤵
- Program crash
PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 11407⤵
- Program crash
PID:4396
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:2560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 10167⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 13007⤵
- Program crash
PID:424
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:4364
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:1804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2236
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:3764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:4080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 7527⤵
- Program crash
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 13407⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 13487⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 12967⤵
- Program crash
PID:4588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 11647⤵
- Program crash
PID:4748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 14246⤵
- Program crash
PID:4284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d6300143.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d6300143.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e5155471.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e5155471.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 15004⤵
- Program crash
PID:4880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6980579.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6980579.exe2⤵
- Executes dropped EXE
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4356 -ip 43561⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4968 -ip 49681⤵PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4968 -ip 49681⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4968 -ip 49681⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4968 -ip 49681⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4968 -ip 49681⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4968 -ip 49681⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4968 -ip 49681⤵PID:4048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4968 -ip 49681⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4968 -ip 49681⤵PID:3648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4968 -ip 49681⤵PID:3056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 5112 -ip 51121⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 5112 -ip 51121⤵PID:2284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 5112 -ip 51121⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 5112 -ip 51121⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 5112 -ip 51121⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 5112 -ip 51121⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 5112 -ip 51121⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 5112 -ip 51121⤵PID:2252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 5112 -ip 51121⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 5112 -ip 51121⤵PID:2816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 5112 -ip 51121⤵PID:2528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 5112 -ip 51121⤵PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 3900 -ip 39001⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 5112 -ip 51121⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 3162⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 748 -p 3712 -ip 37121⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 5112 -ip 51121⤵PID:1144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD52dd4c8543d119e8df4f3e97f417ae0af
SHA1050270ee7d4cfd8fbd6aa60ed818073d2d1aef96
SHA256a67d2c7df56f480a6266b9deea188eddb979d3ef54a25221294a1d9bd0a71c22
SHA512dfc640d9a874f4f5ba092efbd292187a7e35f95e44f9d0c3dbc076e3f1a4a1be9d06b65d639142d4ec0440c783da6ea0c542c65d61d90e39d9d5f824291b1b95
-
Filesize
206KB
MD52dd4c8543d119e8df4f3e97f417ae0af
SHA1050270ee7d4cfd8fbd6aa60ed818073d2d1aef96
SHA256a67d2c7df56f480a6266b9deea188eddb979d3ef54a25221294a1d9bd0a71c22
SHA512dfc640d9a874f4f5ba092efbd292187a7e35f95e44f9d0c3dbc076e3f1a4a1be9d06b65d639142d4ec0440c783da6ea0c542c65d61d90e39d9d5f824291b1b95
-
Filesize
1.4MB
MD50a4367d6a8fb282fa23c05ce3076927c
SHA13162c7958118e3a7b1004828e7a84cd1173a12a6
SHA256ad0c802ed61443e6068ac0e2d4c0511a32185348ee6d6cff90ff58d92edbf70a
SHA5129b47109ff6d6d42ffdfb8d27696ff2363127c6702e4f62906806d32ea08e2c0b4c38cc7440d3cd2859a892599eb4ee44f3dcded851708a3b3e26b7f19468b068
-
Filesize
1.4MB
MD50a4367d6a8fb282fa23c05ce3076927c
SHA13162c7958118e3a7b1004828e7a84cd1173a12a6
SHA256ad0c802ed61443e6068ac0e2d4c0511a32185348ee6d6cff90ff58d92edbf70a
SHA5129b47109ff6d6d42ffdfb8d27696ff2363127c6702e4f62906806d32ea08e2c0b4c38cc7440d3cd2859a892599eb4ee44f3dcded851708a3b3e26b7f19468b068
-
Filesize
548KB
MD56f66461f57d9594ed3a8f7071f68abbc
SHA1db948f94fc647ea03a6b04068cf52151e5afe9bf
SHA256df8eb237b113d001505d5ebb50e944999bf45462ddd9cfa1cbfedb2715eb3e30
SHA512002274f952a5abc2de786f070894c26a0b7c15376065f590f3cb797bd70ef649cdf5133a3905c4a55909b63a9fdf4d818fc5c8517cf86c4be2b39a01bc7a7b20
-
Filesize
548KB
MD56f66461f57d9594ed3a8f7071f68abbc
SHA1db948f94fc647ea03a6b04068cf52151e5afe9bf
SHA256df8eb237b113d001505d5ebb50e944999bf45462ddd9cfa1cbfedb2715eb3e30
SHA512002274f952a5abc2de786f070894c26a0b7c15376065f590f3cb797bd70ef649cdf5133a3905c4a55909b63a9fdf4d818fc5c8517cf86c4be2b39a01bc7a7b20
-
Filesize
915KB
MD59d1e343ffb111a630fea64b9c946ddc1
SHA1530287eff3a8f437dd72f3ba9b94602facba5149
SHA2561ad43f9cf5dd14bd6d6d71a9c75bfb632d25d491abdbdc4e5a022b3927ceae05
SHA5121ade29e91a2b9ddb82fd1475c2a4e85fe8a3fb3489ae6b96d960ad5dbe1a69db1d4b077bd9b6bb2a38fe05ba7d91d81b5c4ab644991d03fcf14d36874b81081f
-
Filesize
915KB
MD59d1e343ffb111a630fea64b9c946ddc1
SHA1530287eff3a8f437dd72f3ba9b94602facba5149
SHA2561ad43f9cf5dd14bd6d6d71a9c75bfb632d25d491abdbdc4e5a022b3927ceae05
SHA5121ade29e91a2b9ddb82fd1475c2a4e85fe8a3fb3489ae6b96d960ad5dbe1a69db1d4b077bd9b6bb2a38fe05ba7d91d81b5c4ab644991d03fcf14d36874b81081f
-
Filesize
179KB
MD5bcf36b8d59fb9ea6a9ee8c88d4d1911d
SHA1eee10c92bc1db257860211f120fbd89f059e5542
SHA256098f40d3e081b77f8181d5c701f08ca9924be94f00225baff348cbdf4f2398fd
SHA5128f6efb102ff2c933ff338da14ba39eb08de0c76722554b5ad226d52ee72ca19e316ca5e2e71b931b10921d2c8518c8ba3a48ac515973531597cba544c9f0fa72
-
Filesize
179KB
MD5bcf36b8d59fb9ea6a9ee8c88d4d1911d
SHA1eee10c92bc1db257860211f120fbd89f059e5542
SHA256098f40d3e081b77f8181d5c701f08ca9924be94f00225baff348cbdf4f2398fd
SHA5128f6efb102ff2c933ff338da14ba39eb08de0c76722554b5ad226d52ee72ca19e316ca5e2e71b931b10921d2c8518c8ba3a48ac515973531597cba544c9f0fa72
-
Filesize
711KB
MD555b831200167b6a90c63349fee08fa8c
SHA18b5e830f68df02bbcb70739f7f6a626dc015b2c4
SHA2567359f635c50db3cb794a29dcf5228f359a0d05ef01a9afa51d7bfb956a9074a0
SHA5120046bc22f46b8c1cfd17013071ce404f7c66b6a3b97b8db8fe1662773ec65c5a512bc2634ee64f70d56f9b5a1c38273c0d9e67698e11d96a0b92b4baf24a42ad
-
Filesize
711KB
MD555b831200167b6a90c63349fee08fa8c
SHA18b5e830f68df02bbcb70739f7f6a626dc015b2c4
SHA2567359f635c50db3cb794a29dcf5228f359a0d05ef01a9afa51d7bfb956a9074a0
SHA5120046bc22f46b8c1cfd17013071ce404f7c66b6a3b97b8db8fe1662773ec65c5a512bc2634ee64f70d56f9b5a1c38273c0d9e67698e11d96a0b92b4baf24a42ad
-
Filesize
349KB
MD514a94728ff4ed1740904d5f21f4fafc5
SHA11d47c2e13fa53e6caf1202372862592cc8a66c19
SHA256aff36b5efce355a9d89155f96700681cd4abbd037abe21c964c9c117ea4ffcb5
SHA512f68623bd058c4528fcd1a8be413139820733a3860a3acd00add81002877ba1e69ea64afb775eb2623104eb58f6762f386470a6e0e4a4cdda21218e3835aac582
-
Filesize
349KB
MD514a94728ff4ed1740904d5f21f4fafc5
SHA11d47c2e13fa53e6caf1202372862592cc8a66c19
SHA256aff36b5efce355a9d89155f96700681cd4abbd037abe21c964c9c117ea4ffcb5
SHA512f68623bd058c4528fcd1a8be413139820733a3860a3acd00add81002877ba1e69ea64afb775eb2623104eb58f6762f386470a6e0e4a4cdda21218e3835aac582
-
Filesize
416KB
MD56cdc01af6b8b322ccf3683a4080bfaac
SHA17177bc12dd2656de7c955a00978c44db9c6e099c
SHA256d91b033796c1ae62c78a95e3b607b12e1698d67944e610d6673e55962eb84e0b
SHA512670729a4edcf3584dfb92074806133e7f7a03b0cfb1280da607da988b06d091129fbf92c82cc2acb07fc9443fd5b9867454f5f965864f9fee604e9082b34b68d
-
Filesize
416KB
MD56cdc01af6b8b322ccf3683a4080bfaac
SHA17177bc12dd2656de7c955a00978c44db9c6e099c
SHA256d91b033796c1ae62c78a95e3b607b12e1698d67944e610d6673e55962eb84e0b
SHA512670729a4edcf3584dfb92074806133e7f7a03b0cfb1280da607da988b06d091129fbf92c82cc2acb07fc9443fd5b9867454f5f965864f9fee604e9082b34b68d
-
Filesize
360KB
MD53042e528b54c3d4843822dd196316038
SHA1ca25f9b8ab588a104240a9dd51ae3dc84955fffe
SHA25616c46be10c3eb5d057a845ccf1918c9a398f7d62e240d8fbdf1015c37612776a
SHA51266f33de6e7fcb7589960743b0f580e24e3922db72c961558d2f2a6478e9d2d29563a5f3e0a0979c11df56a57c7d5bc7d0958f43de9b0ba697136521c0ebe2e7d
-
Filesize
360KB
MD53042e528b54c3d4843822dd196316038
SHA1ca25f9b8ab588a104240a9dd51ae3dc84955fffe
SHA25616c46be10c3eb5d057a845ccf1918c9a398f7d62e240d8fbdf1015c37612776a
SHA51266f33de6e7fcb7589960743b0f580e24e3922db72c961558d2f2a6478e9d2d29563a5f3e0a0979c11df56a57c7d5bc7d0958f43de9b0ba697136521c0ebe2e7d
-
Filesize
168KB
MD5ccdba458fcc5d0d60d66b0860bd88417
SHA1a091ad521ea88422bd72bd7ca9dbae80b9e833cb
SHA2567a11a25fc609da2ef8a490a5448eb77e7e7a02caca87e4e4f3779ef9e20f4c76
SHA51214b8cd64188f8b1ba30bbd36e2317ae74a5b39416d260dd03ac5935734ac3d288af2c03aefff317f1a8e369c38d6e95eb4b052bed86caf38ea64d50de7889d48
-
Filesize
168KB
MD5ccdba458fcc5d0d60d66b0860bd88417
SHA1a091ad521ea88422bd72bd7ca9dbae80b9e833cb
SHA2567a11a25fc609da2ef8a490a5448eb77e7e7a02caca87e4e4f3779ef9e20f4c76
SHA51214b8cd64188f8b1ba30bbd36e2317ae74a5b39416d260dd03ac5935734ac3d288af2c03aefff317f1a8e369c38d6e95eb4b052bed86caf38ea64d50de7889d48
-
Filesize
349KB
MD514a94728ff4ed1740904d5f21f4fafc5
SHA11d47c2e13fa53e6caf1202372862592cc8a66c19
SHA256aff36b5efce355a9d89155f96700681cd4abbd037abe21c964c9c117ea4ffcb5
SHA512f68623bd058c4528fcd1a8be413139820733a3860a3acd00add81002877ba1e69ea64afb775eb2623104eb58f6762f386470a6e0e4a4cdda21218e3835aac582
-
Filesize
349KB
MD514a94728ff4ed1740904d5f21f4fafc5
SHA11d47c2e13fa53e6caf1202372862592cc8a66c19
SHA256aff36b5efce355a9d89155f96700681cd4abbd037abe21c964c9c117ea4ffcb5
SHA512f68623bd058c4528fcd1a8be413139820733a3860a3acd00add81002877ba1e69ea64afb775eb2623104eb58f6762f386470a6e0e4a4cdda21218e3835aac582
-
Filesize
349KB
MD514a94728ff4ed1740904d5f21f4fafc5
SHA11d47c2e13fa53e6caf1202372862592cc8a66c19
SHA256aff36b5efce355a9d89155f96700681cd4abbd037abe21c964c9c117ea4ffcb5
SHA512f68623bd058c4528fcd1a8be413139820733a3860a3acd00add81002877ba1e69ea64afb775eb2623104eb58f6762f386470a6e0e4a4cdda21218e3835aac582
-
Filesize
349KB
MD514a94728ff4ed1740904d5f21f4fafc5
SHA11d47c2e13fa53e6caf1202372862592cc8a66c19
SHA256aff36b5efce355a9d89155f96700681cd4abbd037abe21c964c9c117ea4ffcb5
SHA512f68623bd058c4528fcd1a8be413139820733a3860a3acd00add81002877ba1e69ea64afb775eb2623104eb58f6762f386470a6e0e4a4cdda21218e3835aac582
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b