Analysis
-
max time kernel
163s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:49
Static task
static1
Behavioral task
behavioral1
Sample
a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe
Resource
win10v2004-20230220-en
General
-
Target
a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe
-
Size
1.4MB
-
MD5
4a1a2d8cea273b2f00fdb392b11d28bb
-
SHA1
18c1ccae707fc0b4e3a924d2ce15208cc491caf1
-
SHA256
a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7
-
SHA512
c5fcb678a752607c0363b37712dc646df4f2f55292f819d78512db88217fffda1b870c37ba026422e4914e208f2d229aaeccb3e63467520c5c1efb29b4aa3e48
-
SSDEEP
24576:ryzkBD8B9son0UFv0QJOGc+adN9mTuncYqeSZENEcOjnzAn7gfTHkmiC/Np4Yw9Z:eWIBr0Up0QZc+e7lnMemEecO7zA7oHk5
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2536-213-0x000000000A420000-0x000000000AA38000-memory.dmp redline_stealer behavioral2/memory/2536-220-0x000000000A370000-0x000000000A3D6000-memory.dmp redline_stealer behavioral2/memory/2536-222-0x000000000B810000-0x000000000B9D2000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0084825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0084825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d0545527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d0545527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d0545527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d0545527.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0084825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0084825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d0545527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0084825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0084825.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation e0618174.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation c4083212.exe -
Executes dropped EXE 13 IoCs
pid Process 3196 v2004815.exe 1068 v4483973.exe 3832 v5261380.exe 924 v7949466.exe 220 a0084825.exe 2536 b3928555.exe 1804 c4083212.exe 4140 oneetx.exe 1032 d0545527.exe 3564 e0618174.exe 4588 1.exe 3544 f8427551.exe 1116 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1080 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0084825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0084825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d0545527.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v7949466.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2004815.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5261380.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7949466.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5261380.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2004815.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4483973.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4483973.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 1348 220 WerFault.exe 86 3568 1804 WerFault.exe 92 932 1804 WerFault.exe 92 1360 1804 WerFault.exe 92 4108 1804 WerFault.exe 92 2204 1804 WerFault.exe 92 4948 1804 WerFault.exe 92 4268 1804 WerFault.exe 92 1604 1804 WerFault.exe 92 2672 1804 WerFault.exe 92 2880 1804 WerFault.exe 92 3328 4140 WerFault.exe 111 224 4140 WerFault.exe 111 2588 4140 WerFault.exe 111 3004 4140 WerFault.exe 111 3512 4140 WerFault.exe 111 4128 4140 WerFault.exe 111 948 4140 WerFault.exe 111 2604 4140 WerFault.exe 111 1944 4140 WerFault.exe 111 4796 4140 WerFault.exe 111 4772 4140 WerFault.exe 111 5088 3564 WerFault.exe 135 2392 4140 WerFault.exe 111 2536 4140 WerFault.exe 111 3036 4140 WerFault.exe 111 4280 4140 WerFault.exe 111 4564 1116 WerFault.exe 160 1860 4140 WerFault.exe 111 1520 4140 WerFault.exe 111 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 220 a0084825.exe 220 a0084825.exe 2536 b3928555.exe 2536 b3928555.exe 1032 d0545527.exe 1032 d0545527.exe 4588 1.exe 4588 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 220 a0084825.exe Token: SeDebugPrivilege 2536 b3928555.exe Token: SeDebugPrivilege 1032 d0545527.exe Token: SeDebugPrivilege 3564 e0618174.exe Token: SeDebugPrivilege 4588 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1804 c4083212.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1328 wrote to memory of 3196 1328 a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe 82 PID 1328 wrote to memory of 3196 1328 a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe 82 PID 1328 wrote to memory of 3196 1328 a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe 82 PID 3196 wrote to memory of 1068 3196 v2004815.exe 83 PID 3196 wrote to memory of 1068 3196 v2004815.exe 83 PID 3196 wrote to memory of 1068 3196 v2004815.exe 83 PID 1068 wrote to memory of 3832 1068 v4483973.exe 84 PID 1068 wrote to memory of 3832 1068 v4483973.exe 84 PID 1068 wrote to memory of 3832 1068 v4483973.exe 84 PID 3832 wrote to memory of 924 3832 v5261380.exe 85 PID 3832 wrote to memory of 924 3832 v5261380.exe 85 PID 3832 wrote to memory of 924 3832 v5261380.exe 85 PID 924 wrote to memory of 220 924 v7949466.exe 86 PID 924 wrote to memory of 220 924 v7949466.exe 86 PID 924 wrote to memory of 220 924 v7949466.exe 86 PID 924 wrote to memory of 2536 924 v7949466.exe 91 PID 924 wrote to memory of 2536 924 v7949466.exe 91 PID 924 wrote to memory of 2536 924 v7949466.exe 91 PID 3832 wrote to memory of 1804 3832 v5261380.exe 92 PID 3832 wrote to memory of 1804 3832 v5261380.exe 92 PID 3832 wrote to memory of 1804 3832 v5261380.exe 92 PID 1804 wrote to memory of 4140 1804 c4083212.exe 111 PID 1804 wrote to memory of 4140 1804 c4083212.exe 111 PID 1804 wrote to memory of 4140 1804 c4083212.exe 111 PID 1068 wrote to memory of 1032 1068 v4483973.exe 114 PID 1068 wrote to memory of 1032 1068 v4483973.exe 114 PID 1068 wrote to memory of 1032 1068 v4483973.exe 114 PID 4140 wrote to memory of 1368 4140 oneetx.exe 129 PID 4140 wrote to memory of 1368 4140 oneetx.exe 129 PID 4140 wrote to memory of 1368 4140 oneetx.exe 129 PID 3196 wrote to memory of 3564 3196 v2004815.exe 135 PID 3196 wrote to memory of 3564 3196 v2004815.exe 135 PID 3196 wrote to memory of 3564 3196 v2004815.exe 135 PID 4140 wrote to memory of 3852 4140 oneetx.exe 136 PID 4140 wrote to memory of 3852 4140 oneetx.exe 136 PID 4140 wrote to memory of 3852 4140 oneetx.exe 136 PID 3852 wrote to memory of 4584 3852 cmd.exe 140 PID 3852 wrote to memory of 4584 3852 cmd.exe 140 PID 3852 wrote to memory of 4584 3852 cmd.exe 140 PID 3852 wrote to memory of 3628 3852 cmd.exe 141 PID 3852 wrote to memory of 3628 3852 cmd.exe 141 PID 3852 wrote to memory of 3628 3852 cmd.exe 141 PID 3852 wrote to memory of 2576 3852 cmd.exe 142 PID 3852 wrote to memory of 2576 3852 cmd.exe 142 PID 3852 wrote to memory of 2576 3852 cmd.exe 142 PID 3852 wrote to memory of 836 3852 cmd.exe 143 PID 3852 wrote to memory of 836 3852 cmd.exe 143 PID 3852 wrote to memory of 836 3852 cmd.exe 143 PID 3852 wrote to memory of 1848 3852 cmd.exe 144 PID 3852 wrote to memory of 1848 3852 cmd.exe 144 PID 3852 wrote to memory of 1848 3852 cmd.exe 144 PID 3852 wrote to memory of 2104 3852 cmd.exe 145 PID 3852 wrote to memory of 2104 3852 cmd.exe 145 PID 3852 wrote to memory of 2104 3852 cmd.exe 145 PID 3564 wrote to memory of 4588 3564 e0618174.exe 147 PID 3564 wrote to memory of 4588 3564 e0618174.exe 147 PID 3564 wrote to memory of 4588 3564 e0618174.exe 147 PID 1328 wrote to memory of 3544 1328 a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe 153 PID 1328 wrote to memory of 3544 1328 a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe 153 PID 1328 wrote to memory of 3544 1328 a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe 153 PID 4140 wrote to memory of 1080 4140 oneetx.exe 165 PID 4140 wrote to memory of 1080 4140 oneetx.exe 165 PID 4140 wrote to memory of 1080 4140 oneetx.exe 165
Processes
-
C:\Users\Admin\AppData\Local\Temp\a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe"C:\Users\Admin\AppData\Local\Temp\a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2004815.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2004815.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4483973.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4483973.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5261380.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5261380.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7949466.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7949466.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0084825.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0084825.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 10127⤵
- Program crash
PID:1348
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3928555.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3928555.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4083212.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4083212.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 6966⤵
- Program crash
PID:3568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 7646⤵
- Program crash
PID:932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 8566⤵
- Program crash
PID:1360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 9606⤵
- Program crash
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 8646⤵
- Program crash
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 8566⤵
- Program crash
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 12206⤵
- Program crash
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 12406⤵
- Program crash
PID:1604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 13206⤵
- Program crash
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 6927⤵
- Program crash
PID:3328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 8487⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 9127⤵
- Program crash
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 10527⤵
- Program crash
PID:3004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 10967⤵
- Program crash
PID:3512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 10967⤵
- Program crash
PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 11087⤵
- Program crash
PID:948
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 9927⤵
- Program crash
PID:2604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 7607⤵
- Program crash
PID:1944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4584
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:3628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:2576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:836
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:1848
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:2104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 7567⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 7767⤵
- Program crash
PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 7847⤵
- Program crash
PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 12887⤵
- Program crash
PID:2536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 15327⤵
- Program crash
PID:3036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 10807⤵
- Program crash
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 16247⤵
- Program crash
PID:1860
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 15447⤵
- Program crash
PID:1520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 14366⤵
- Program crash
PID:2880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d0545527.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d0545527.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e0618174.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e0618174.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 13724⤵
- Program crash
PID:5088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f8427551.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f8427551.exe2⤵
- Executes dropped EXE
PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 220 -ip 2201⤵PID:4580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1804 -ip 18041⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1804 -ip 18041⤵PID:2196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1804 -ip 18041⤵PID:2552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1804 -ip 18041⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1804 -ip 18041⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1804 -ip 18041⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1804 -ip 18041⤵PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1804 -ip 18041⤵PID:848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1804 -ip 18041⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1804 -ip 18041⤵PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4140 -ip 41401⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4140 -ip 41401⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4140 -ip 41401⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4140 -ip 41401⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4140 -ip 41401⤵PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4140 -ip 41401⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4140 -ip 41401⤵PID:3408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4140 -ip 41401⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4140 -ip 41401⤵PID:4612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4140 -ip 41401⤵PID:852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4140 -ip 41401⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3564 -ip 35641⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4140 -ip 41401⤵PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4140 -ip 41401⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4140 -ip 41401⤵PID:3248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4140 -ip 41401⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 3122⤵
- Program crash
PID:4564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1116 -ip 11161⤵PID:3000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4140 -ip 41401⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4140 -ip 41401⤵PID:436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD52fc2d36b055ad5c4173946e24ea33eb6
SHA10f63dbcdee4c34b9ea371f2075e86b8be58a5a35
SHA2560357283110ca780e859e2c686a745f82dfc119f0209b825139869eb368b234ca
SHA512eddaef015d567a46410d8ac24ff8c6a91e3035c5137fa3cb56b2dbd35fe2e0f5039b92ea6f6c8dd839922fb26d509641e56d08dd2e3bdb2f0cba4b9f9698c16c
-
Filesize
205KB
MD52fc2d36b055ad5c4173946e24ea33eb6
SHA10f63dbcdee4c34b9ea371f2075e86b8be58a5a35
SHA2560357283110ca780e859e2c686a745f82dfc119f0209b825139869eb368b234ca
SHA512eddaef015d567a46410d8ac24ff8c6a91e3035c5137fa3cb56b2dbd35fe2e0f5039b92ea6f6c8dd839922fb26d509641e56d08dd2e3bdb2f0cba4b9f9698c16c
-
Filesize
1.3MB
MD5d97ced30e42d967cad40fc65680542d7
SHA1e364a380304af7be333e8fc95bada9e3d1cc1185
SHA2568dcebbc3d19799d3fc170b2bd5df87457d8e9fb16db3767f7d6c10c908ea673d
SHA51291a3bc49e8ea2e78d1d960360ce7901f6c216abfbcd0148eac848bd6def73186c357f73dcc26dcc6714e01d51e0201d211a43598241bd667f88e30f54f0d7bd1
-
Filesize
1.3MB
MD5d97ced30e42d967cad40fc65680542d7
SHA1e364a380304af7be333e8fc95bada9e3d1cc1185
SHA2568dcebbc3d19799d3fc170b2bd5df87457d8e9fb16db3767f7d6c10c908ea673d
SHA51291a3bc49e8ea2e78d1d960360ce7901f6c216abfbcd0148eac848bd6def73186c357f73dcc26dcc6714e01d51e0201d211a43598241bd667f88e30f54f0d7bd1
-
Filesize
475KB
MD5c324f43691e49b8001a801d93c93248d
SHA167e2d8439ce778ba0c17d9e96e22200246facac4
SHA256022cd01fa16a2277c6a23140546fb264b58672c865cc745d02cdd4216ed95ca2
SHA5121a1e429f16636984c0d7b87888ead2212db840872a3bbbbcdcdaa8db8d7768bbca86bea0854d282c7db7eb73e9f1ea3730d06f150d5617fe4038e47bf85fd118
-
Filesize
475KB
MD5c324f43691e49b8001a801d93c93248d
SHA167e2d8439ce778ba0c17d9e96e22200246facac4
SHA256022cd01fa16a2277c6a23140546fb264b58672c865cc745d02cdd4216ed95ca2
SHA5121a1e429f16636984c0d7b87888ead2212db840872a3bbbbcdcdaa8db8d7768bbca86bea0854d282c7db7eb73e9f1ea3730d06f150d5617fe4038e47bf85fd118
-
Filesize
845KB
MD5319e269d7e74ae05f1d887421d90bee1
SHA15fe22dce5799a0321bce4f89016245d5b29c98c3
SHA25696b7eb995e3e48cbf39c51ccc8d630e9280df30f6f01a9a56247fa45ac8919b1
SHA5124a2ceac997ed319bbebcd836fcbaa64e6f555e43f9c7651725b3f83c5a4df09d8ca92c1b252902fa3c2c20e6d805f5d0c2d7913f259b00ecfa669efb99fe6011
-
Filesize
845KB
MD5319e269d7e74ae05f1d887421d90bee1
SHA15fe22dce5799a0321bce4f89016245d5b29c98c3
SHA25696b7eb995e3e48cbf39c51ccc8d630e9280df30f6f01a9a56247fa45ac8919b1
SHA5124a2ceac997ed319bbebcd836fcbaa64e6f555e43f9c7651725b3f83c5a4df09d8ca92c1b252902fa3c2c20e6d805f5d0c2d7913f259b00ecfa669efb99fe6011
-
Filesize
178KB
MD59e029a1cad81d184b95fb591d7229cc7
SHA14fde66fc066617f2f7aad825d540e24a1488ed05
SHA256e628e4187251be3d03c71248fedc8c3737158801de54b916040ed4c8c27f1854
SHA512a5836215a845bebadbdae6f06c50396e359c7c0814abd8d85918a250c9c6a624cd2c78af247c34c9068731410787400cdcf3c800c9c2a6a7e45de1d4ece78aba
-
Filesize
178KB
MD59e029a1cad81d184b95fb591d7229cc7
SHA14fde66fc066617f2f7aad825d540e24a1488ed05
SHA256e628e4187251be3d03c71248fedc8c3737158801de54b916040ed4c8c27f1854
SHA512a5836215a845bebadbdae6f06c50396e359c7c0814abd8d85918a250c9c6a624cd2c78af247c34c9068731410787400cdcf3c800c9c2a6a7e45de1d4ece78aba
-
Filesize
641KB
MD5706119ed59aca5113ad4e2e5631ae707
SHA1f1785a4f3d5ccfc9af960e0a11e96a82f0e53684
SHA256e16f91f3c7ec252b69e00885bbd36795a662883b3ae8337cd3f5b248ba212aed
SHA5120af027cdc8974afa22ab476384a82778b9ea1132f3f5f498b247918110c380fc1ab94c313e51a8aafde2ae2ba784f2ec505707cc64312a171965912b696f1322
-
Filesize
641KB
MD5706119ed59aca5113ad4e2e5631ae707
SHA1f1785a4f3d5ccfc9af960e0a11e96a82f0e53684
SHA256e16f91f3c7ec252b69e00885bbd36795a662883b3ae8337cd3f5b248ba212aed
SHA5120af027cdc8974afa22ab476384a82778b9ea1132f3f5f498b247918110c380fc1ab94c313e51a8aafde2ae2ba784f2ec505707cc64312a171965912b696f1322
-
Filesize
268KB
MD53c5b293c4b37f46906da0673305a5d64
SHA19318283e5e543682649660c09128cb48e5cba57e
SHA2562ec9bdcfc9238193928a72d258bd5ec394feb69755d5654d28982eb144ec267d
SHA5128b3f9138f8316d095316913d9c6cd144f47d72e41e705e7a0885267a597a93f2972c223102b7957bd98019d38de5c9e986ea81b9c1d5f60e77f73a4616309f95
-
Filesize
268KB
MD53c5b293c4b37f46906da0673305a5d64
SHA19318283e5e543682649660c09128cb48e5cba57e
SHA2562ec9bdcfc9238193928a72d258bd5ec394feb69755d5654d28982eb144ec267d
SHA5128b3f9138f8316d095316913d9c6cd144f47d72e41e705e7a0885267a597a93f2972c223102b7957bd98019d38de5c9e986ea81b9c1d5f60e77f73a4616309f95
-
Filesize
383KB
MD53161f36ff7ef21ab71e16aa3beb5e23e
SHA17c1fccbb387be03e96912edc0c6804df4b23dbee
SHA256cf0fa9c653b07d811b99af2b47cf14754fb40684f87f437e663df0429b447446
SHA51231ed3d688a825a99485678f481a2ce99e8ee719f53f105701804129e5310fe844fec8b6abeafb24ac6507c6ff18767b51e8bbab001601d145fa8e1fb26c698fc
-
Filesize
383KB
MD53161f36ff7ef21ab71e16aa3beb5e23e
SHA17c1fccbb387be03e96912edc0c6804df4b23dbee
SHA256cf0fa9c653b07d811b99af2b47cf14754fb40684f87f437e663df0429b447446
SHA51231ed3d688a825a99485678f481a2ce99e8ee719f53f105701804129e5310fe844fec8b6abeafb24ac6507c6ff18767b51e8bbab001601d145fa8e1fb26c698fc
-
Filesize
289KB
MD59d22a643c9d7ef87e9116e96b515b964
SHA18ff8e3cf1ac07823c99b8cff0af46d34affc51ef
SHA2568353887268023d313802e64a63e781a6a7175c980ab0fcae5bf4e98974569d3f
SHA51228f39d6ee86ed29f46a1fe88c64af6f1ca1c9aca2d03f2a8439b59db7b61fd7606abfea9107b77c5f3fe06dd9f2981fdedf2e02bf8311e52e402c4a79c9fdff4
-
Filesize
289KB
MD59d22a643c9d7ef87e9116e96b515b964
SHA18ff8e3cf1ac07823c99b8cff0af46d34affc51ef
SHA2568353887268023d313802e64a63e781a6a7175c980ab0fcae5bf4e98974569d3f
SHA51228f39d6ee86ed29f46a1fe88c64af6f1ca1c9aca2d03f2a8439b59db7b61fd7606abfea9107b77c5f3fe06dd9f2981fdedf2e02bf8311e52e402c4a79c9fdff4
-
Filesize
168KB
MD53a749f1d255e1b662af1d56de13629a7
SHA1935f08a78be29e959869f4cd967c5b26b249b174
SHA2564e29c7fd03619abd13dd9942fca5ecafa2659a3c1f3ae6d71413f05ea7df7831
SHA51290d57ab60f5088decab4a1c87a1971da4c20a74fc4a7a832a2e0a4a1fc411c2cd4c16f99903209b4bd454c78d13c9543b8894ed268a3934e26a35ed554946b79
-
Filesize
168KB
MD53a749f1d255e1b662af1d56de13629a7
SHA1935f08a78be29e959869f4cd967c5b26b249b174
SHA2564e29c7fd03619abd13dd9942fca5ecafa2659a3c1f3ae6d71413f05ea7df7831
SHA51290d57ab60f5088decab4a1c87a1971da4c20a74fc4a7a832a2e0a4a1fc411c2cd4c16f99903209b4bd454c78d13c9543b8894ed268a3934e26a35ed554946b79
-
Filesize
268KB
MD53c5b293c4b37f46906da0673305a5d64
SHA19318283e5e543682649660c09128cb48e5cba57e
SHA2562ec9bdcfc9238193928a72d258bd5ec394feb69755d5654d28982eb144ec267d
SHA5128b3f9138f8316d095316913d9c6cd144f47d72e41e705e7a0885267a597a93f2972c223102b7957bd98019d38de5c9e986ea81b9c1d5f60e77f73a4616309f95
-
Filesize
268KB
MD53c5b293c4b37f46906da0673305a5d64
SHA19318283e5e543682649660c09128cb48e5cba57e
SHA2562ec9bdcfc9238193928a72d258bd5ec394feb69755d5654d28982eb144ec267d
SHA5128b3f9138f8316d095316913d9c6cd144f47d72e41e705e7a0885267a597a93f2972c223102b7957bd98019d38de5c9e986ea81b9c1d5f60e77f73a4616309f95
-
Filesize
268KB
MD53c5b293c4b37f46906da0673305a5d64
SHA19318283e5e543682649660c09128cb48e5cba57e
SHA2562ec9bdcfc9238193928a72d258bd5ec394feb69755d5654d28982eb144ec267d
SHA5128b3f9138f8316d095316913d9c6cd144f47d72e41e705e7a0885267a597a93f2972c223102b7957bd98019d38de5c9e986ea81b9c1d5f60e77f73a4616309f95
-
Filesize
268KB
MD53c5b293c4b37f46906da0673305a5d64
SHA19318283e5e543682649660c09128cb48e5cba57e
SHA2562ec9bdcfc9238193928a72d258bd5ec394feb69755d5654d28982eb144ec267d
SHA5128b3f9138f8316d095316913d9c6cd144f47d72e41e705e7a0885267a597a93f2972c223102b7957bd98019d38de5c9e986ea81b9c1d5f60e77f73a4616309f95
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b