Analysis
-
max time kernel
165s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108.exe
Resource
win10v2004-20230220-en
General
-
Target
bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108.exe
-
Size
1.6MB
-
MD5
38549fc160cd0a1acb574e876fa293bf
-
SHA1
5fe40e28e4c626602aa48003a34c587e963a4b9a
-
SHA256
bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108
-
SHA512
60cac110b1e4909d29589d5e1b632a5fb3842397fdf089e2d077a5c370945638184ce745dce79687384c91d25e5845acd8736ee598c93dce9e47339262404d9f
-
SSDEEP
49152:YR3ITaxKkBgHL/PwtRhJ7UscUeJUQhxJPzGR:ShxKki/Pw3hlb8xJ7
Malware Config
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3332-211-0x00000000079B0000-0x0000000007FC8000-memory.dmp redline_stealer behavioral2/memory/3332-216-0x0000000007840000-0x00000000078A6000-memory.dmp redline_stealer behavioral2/memory/3332-219-0x0000000008E40000-0x0000000009002000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d5933013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d5933013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6514719.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6514719.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d5933013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6514719.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d5933013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d5933013.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a6514719.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6514719.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6514719.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation e8482418.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation c4154299.exe -
Executes dropped EXE 13 IoCs
pid Process 4684 v9145358.exe 4212 v5717963.exe 2996 v6564300.exe 4804 v1385139.exe 2836 a6514719.exe 3332 b2397054.exe 1152 c4154299.exe 4464 oneetx.exe 1928 d5933013.exe 4796 e8482418.exe 3736 1.exe 2904 f5133992.exe 2472 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a6514719.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a6514719.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d5933013.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9145358.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5717963.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6564300.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1385139.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9145358.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5717963.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6564300.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v1385139.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 2816 2836 WerFault.exe 86 1460 1152 WerFault.exe 91 4788 1152 WerFault.exe 91 3368 1152 WerFault.exe 91 2464 1152 WerFault.exe 91 376 1152 WerFault.exe 91 4416 1152 WerFault.exe 91 4768 1152 WerFault.exe 91 2808 1152 WerFault.exe 91 1456 1152 WerFault.exe 91 772 1152 WerFault.exe 91 1196 1152 WerFault.exe 91 1876 4464 WerFault.exe 112 1816 4464 WerFault.exe 112 4904 4464 WerFault.exe 112 4384 4464 WerFault.exe 112 4508 4464 WerFault.exe 112 2476 4464 WerFault.exe 112 4856 4796 WerFault.exe 124 3768 4464 WerFault.exe 112 1868 4464 WerFault.exe 112 3840 4464 WerFault.exe 112 4644 4464 WerFault.exe 112 4120 4464 WerFault.exe 112 3076 4464 WerFault.exe 112 324 4464 WerFault.exe 112 3620 4464 WerFault.exe 112 2908 2472 WerFault.exe 159 3488 4464 WerFault.exe 112 4980 4464 WerFault.exe 112 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2836 a6514719.exe 2836 a6514719.exe 3332 b2397054.exe 3332 b2397054.exe 1928 d5933013.exe 1928 d5933013.exe 3736 1.exe 3736 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2836 a6514719.exe Token: SeDebugPrivilege 3332 b2397054.exe Token: SeDebugPrivilege 1928 d5933013.exe Token: SeDebugPrivilege 4796 e8482418.exe Token: SeDebugPrivilege 3736 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 c4154299.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2620 wrote to memory of 4684 2620 bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108.exe 82 PID 2620 wrote to memory of 4684 2620 bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108.exe 82 PID 2620 wrote to memory of 4684 2620 bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108.exe 82 PID 4684 wrote to memory of 4212 4684 v9145358.exe 83 PID 4684 wrote to memory of 4212 4684 v9145358.exe 83 PID 4684 wrote to memory of 4212 4684 v9145358.exe 83 PID 4212 wrote to memory of 2996 4212 v5717963.exe 84 PID 4212 wrote to memory of 2996 4212 v5717963.exe 84 PID 4212 wrote to memory of 2996 4212 v5717963.exe 84 PID 2996 wrote to memory of 4804 2996 v6564300.exe 85 PID 2996 wrote to memory of 4804 2996 v6564300.exe 85 PID 2996 wrote to memory of 4804 2996 v6564300.exe 85 PID 4804 wrote to memory of 2836 4804 v1385139.exe 86 PID 4804 wrote to memory of 2836 4804 v1385139.exe 86 PID 4804 wrote to memory of 2836 4804 v1385139.exe 86 PID 4804 wrote to memory of 3332 4804 v1385139.exe 90 PID 4804 wrote to memory of 3332 4804 v1385139.exe 90 PID 4804 wrote to memory of 3332 4804 v1385139.exe 90 PID 2996 wrote to memory of 1152 2996 v6564300.exe 91 PID 2996 wrote to memory of 1152 2996 v6564300.exe 91 PID 2996 wrote to memory of 1152 2996 v6564300.exe 91 PID 1152 wrote to memory of 4464 1152 c4154299.exe 112 PID 1152 wrote to memory of 4464 1152 c4154299.exe 112 PID 1152 wrote to memory of 4464 1152 c4154299.exe 112 PID 4212 wrote to memory of 1928 4212 v5717963.exe 116 PID 4212 wrote to memory of 1928 4212 v5717963.exe 116 PID 4212 wrote to memory of 1928 4212 v5717963.exe 116 PID 4684 wrote to memory of 4796 4684 v9145358.exe 124 PID 4684 wrote to memory of 4796 4684 v9145358.exe 124 PID 4684 wrote to memory of 4796 4684 v9145358.exe 124 PID 4796 wrote to memory of 3736 4796 e8482418.exe 129 PID 4796 wrote to memory of 3736 4796 e8482418.exe 129 PID 4796 wrote to memory of 3736 4796 e8482418.exe 129 PID 2620 wrote to memory of 2904 2620 bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108.exe 134 PID 2620 wrote to memory of 2904 2620 bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108.exe 134 PID 2620 wrote to memory of 2904 2620 bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108.exe 134 PID 4464 wrote to memory of 4832 4464 oneetx.exe 135 PID 4464 wrote to memory of 4832 4464 oneetx.exe 135 PID 4464 wrote to memory of 4832 4464 oneetx.exe 135 PID 4464 wrote to memory of 4108 4464 oneetx.exe 141 PID 4464 wrote to memory of 4108 4464 oneetx.exe 141 PID 4464 wrote to memory of 4108 4464 oneetx.exe 141 PID 4108 wrote to memory of 1968 4108 cmd.exe 144 PID 4108 wrote to memory of 1968 4108 cmd.exe 144 PID 4108 wrote to memory of 1968 4108 cmd.exe 144 PID 4108 wrote to memory of 3260 4108 cmd.exe 146 PID 4108 wrote to memory of 3260 4108 cmd.exe 146 PID 4108 wrote to memory of 3260 4108 cmd.exe 146 PID 4108 wrote to memory of 3964 4108 cmd.exe 147 PID 4108 wrote to memory of 3964 4108 cmd.exe 147 PID 4108 wrote to memory of 3964 4108 cmd.exe 147 PID 4108 wrote to memory of 2788 4108 cmd.exe 148 PID 4108 wrote to memory of 2788 4108 cmd.exe 148 PID 4108 wrote to memory of 2788 4108 cmd.exe 148 PID 4108 wrote to memory of 1672 4108 cmd.exe 149 PID 4108 wrote to memory of 1672 4108 cmd.exe 149 PID 4108 wrote to memory of 1672 4108 cmd.exe 149 PID 4108 wrote to memory of 3176 4108 cmd.exe 150 PID 4108 wrote to memory of 3176 4108 cmd.exe 150 PID 4108 wrote to memory of 3176 4108 cmd.exe 150
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108.exe"C:\Users\Admin\AppData\Local\Temp\bdb277e432a7e7f8bad5f11e01c32d63b04b785e0565fc5790bdcbf88238f108.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9145358.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9145358.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5717963.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5717963.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6564300.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6564300.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1385139.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1385139.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6514719.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6514719.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 10807⤵
- Program crash
PID:2816
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2397054.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2397054.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4154299.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4154299.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 6966⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 7646⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 8086⤵
- Program crash
PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 9766⤵
- Program crash
PID:2464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 9926⤵
- Program crash
PID:376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 9566⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 12166⤵
- Program crash
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 12286⤵
- Program crash
PID:2808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 12886⤵
- Program crash
PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 12966⤵
- Program crash
PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 6927⤵
- Program crash
PID:1876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 8407⤵
- Program crash
PID:1816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 8887⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 10527⤵
- Program crash
PID:4384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 10727⤵
- Program crash
PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 10967⤵
- Program crash
PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 11047⤵
- Program crash
PID:3768
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 9927⤵
- Program crash
PID:1868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 7767⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1968
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:3260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:3964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2788
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:1672
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:3176
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 11127⤵
- Program crash
PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 12887⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 13327⤵
- Program crash
PID:3076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 11127⤵
- Program crash
PID:324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 10887⤵
- Program crash
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 11487⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 16247⤵
- Program crash
PID:4980
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 17526⤵
- Program crash
PID:1196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d5933013.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d5933013.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e8482418.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e8482418.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 12924⤵
- Program crash
PID:4856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f5133992.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f5133992.exe2⤵
- Executes dropped EXE
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2836 -ip 28361⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1152 -ip 11521⤵PID:832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1152 -ip 11521⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1152 -ip 11521⤵PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1152 -ip 11521⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1152 -ip 11521⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1152 -ip 11521⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1152 -ip 11521⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1152 -ip 11521⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1152 -ip 11521⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1152 -ip 11521⤵PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1152 -ip 11521⤵PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4464 -ip 44641⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4464 -ip 44641⤵PID:3560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4464 -ip 44641⤵PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4464 -ip 44641⤵PID:2788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4464 -ip 44641⤵PID:1452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4464 -ip 44641⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4796 -ip 47961⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4464 -ip 44641⤵PID:1656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4464 -ip 44641⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4464 -ip 44641⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4464 -ip 44641⤵PID:1748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4464 -ip 44641⤵PID:4080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4464 -ip 44641⤵PID:2244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4464 -ip 44641⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4464 -ip 44641⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 3162⤵
- Program crash
PID:2908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2472 -ip 24721⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4464 -ip 44641⤵PID:3308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4464 -ip 44641⤵PID:3284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5df513008c259252da1dd431256d6befd
SHA1a06b14550e4e2283d0fce9dae06f539fb5a13499
SHA256d8528a9a883a9d744f024796a5beb9bbc045bfb1e5ed5953cebcbdafb93dae59
SHA5129084d9c85da87296842afb92a648b74b18b53340a24bef84fedca372b2342f775b74fb7af1459847808b15987b830c337aeb70b1be1012f647524827f8a379ed
-
Filesize
204KB
MD5df513008c259252da1dd431256d6befd
SHA1a06b14550e4e2283d0fce9dae06f539fb5a13499
SHA256d8528a9a883a9d744f024796a5beb9bbc045bfb1e5ed5953cebcbdafb93dae59
SHA5129084d9c85da87296842afb92a648b74b18b53340a24bef84fedca372b2342f775b74fb7af1459847808b15987b830c337aeb70b1be1012f647524827f8a379ed
-
Filesize
1.4MB
MD516992d0800b19b554e80fe58e04b5de3
SHA157b42b018ef021938db2db6e88fd9fcb309893e3
SHA25669327377c5a3f9e41a1c722a1e041f76489af9260f395674b9eabf83004cf47d
SHA512e1ffdf45181357b59106b4113ae5b87e13549d8df7364fb100bacbd72511ed7ab0ad183370514633716b04af370bed1675fd55b8cccb282d6a0a6b2ac8bc78e5
-
Filesize
1.4MB
MD516992d0800b19b554e80fe58e04b5de3
SHA157b42b018ef021938db2db6e88fd9fcb309893e3
SHA25669327377c5a3f9e41a1c722a1e041f76489af9260f395674b9eabf83004cf47d
SHA512e1ffdf45181357b59106b4113ae5b87e13549d8df7364fb100bacbd72511ed7ab0ad183370514633716b04af370bed1675fd55b8cccb282d6a0a6b2ac8bc78e5
-
Filesize
548KB
MD5d4547c9d058d67df9a9d25670fd6d128
SHA1f4494404e91a8f94205b8b8cc47347c6f5032d8b
SHA256acf0b2ddd5cb29fa2279fc64546be23ecbcc725cf11d0b07d9438e0844a98c0d
SHA5123620501a5847367a9657fc1ec608244d2eaac254926f10cd5c621b5f72a02b865a4ee099e5435dbd93e10a7d988e54c4244ba636a3570c7393f065abb8b0e947
-
Filesize
548KB
MD5d4547c9d058d67df9a9d25670fd6d128
SHA1f4494404e91a8f94205b8b8cc47347c6f5032d8b
SHA256acf0b2ddd5cb29fa2279fc64546be23ecbcc725cf11d0b07d9438e0844a98c0d
SHA5123620501a5847367a9657fc1ec608244d2eaac254926f10cd5c621b5f72a02b865a4ee099e5435dbd93e10a7d988e54c4244ba636a3570c7393f065abb8b0e947
-
Filesize
918KB
MD5684a32fd1aa52822ab0057b9a5d7bf06
SHA1d15e3386f1234a2b57807c649d55f62e7397de37
SHA2569f94fc687c5247ce5db9ade5c02099c9112353caef47ed76b359eb47e67fa0fa
SHA5126e964f29da563e83eca68331218252c9d59e5b624ce08f3fb1266b1ee5c8f616e845e5657ab06ae5820e1586f79bafefe38390ab9e3132e35da081be291241ea
-
Filesize
918KB
MD5684a32fd1aa52822ab0057b9a5d7bf06
SHA1d15e3386f1234a2b57807c649d55f62e7397de37
SHA2569f94fc687c5247ce5db9ade5c02099c9112353caef47ed76b359eb47e67fa0fa
SHA5126e964f29da563e83eca68331218252c9d59e5b624ce08f3fb1266b1ee5c8f616e845e5657ab06ae5820e1586f79bafefe38390ab9e3132e35da081be291241ea
-
Filesize
175KB
MD51927211b0147e987f730ca88b586e826
SHA1c5d2b532c8cc70d401d047fae2054da90ac1b208
SHA2566ba1f24e22bd18243f0e1163a71238a0439397ece2754be195a74731171b6353
SHA512f3c33e9700ae07dd13aced12559fe7c3a95e558d7914d701baf7862874ce4e87ad6ee58c9ee971f775701f6be4556abb0c35eb86ad10c993ec03e9a01ccb437f
-
Filesize
175KB
MD51927211b0147e987f730ca88b586e826
SHA1c5d2b532c8cc70d401d047fae2054da90ac1b208
SHA2566ba1f24e22bd18243f0e1163a71238a0439397ece2754be195a74731171b6353
SHA512f3c33e9700ae07dd13aced12559fe7c3a95e558d7914d701baf7862874ce4e87ad6ee58c9ee971f775701f6be4556abb0c35eb86ad10c993ec03e9a01ccb437f
-
Filesize
713KB
MD570af927a0aa1e4acb5fc60b42733cdbc
SHA1d252f0c6116e4057ce8cef350bc62df591663113
SHA2562ca0e901b8124cc63be1ab9e0f1db8c5df1cd1a770d257e83cf1c373e4b06b57
SHA512027c06cf84710a16b86cc5d9f31cdae906f90a5d2abbae54c0704d4815021304691aa83b715c67fdc175f453b49a81c2aee6fbf17854b0aa3414a74c0bae4b1e
-
Filesize
713KB
MD570af927a0aa1e4acb5fc60b42733cdbc
SHA1d252f0c6116e4057ce8cef350bc62df591663113
SHA2562ca0e901b8124cc63be1ab9e0f1db8c5df1cd1a770d257e83cf1c373e4b06b57
SHA512027c06cf84710a16b86cc5d9f31cdae906f90a5d2abbae54c0704d4815021304691aa83b715c67fdc175f453b49a81c2aee6fbf17854b0aa3414a74c0bae4b1e
-
Filesize
340KB
MD579930b2e9882007df8653581fa11d45e
SHA1d46f5fde83116211fca28706412f15ac8443ba2e
SHA2563dab74caff4d12c6fa98434cf14ecb4730a3da14ff31fe251a8120cb4a64e7ac
SHA5129762b7f460b9a850b1d3609d763f96daea42ff65be71c5572d7f0d33f5c3f2f9f6af9c01335b4ba961bc5271cbfeb7ad8e047521240186d38acb20561ac5da95
-
Filesize
340KB
MD579930b2e9882007df8653581fa11d45e
SHA1d46f5fde83116211fca28706412f15ac8443ba2e
SHA2563dab74caff4d12c6fa98434cf14ecb4730a3da14ff31fe251a8120cb4a64e7ac
SHA5129762b7f460b9a850b1d3609d763f96daea42ff65be71c5572d7f0d33f5c3f2f9f6af9c01335b4ba961bc5271cbfeb7ad8e047521240186d38acb20561ac5da95
-
Filesize
422KB
MD52dd5d1fadf92419072fb9a345e21b565
SHA1045ae0705fd0b2a763c52e956a085bfd0e270abc
SHA2560751075923e26b481a5b5555288e1dde9abb2d1bcf326baf6f21bd2b26f71529
SHA512ea87639d5611e0951423bb62c3a47ae88f5a6f71e32fe271f5d45d8c57a544f1c2d177841535318c4116009087d507fe96d9a97da25a725cd16ece1a5c9c5ba8
-
Filesize
422KB
MD52dd5d1fadf92419072fb9a345e21b565
SHA1045ae0705fd0b2a763c52e956a085bfd0e270abc
SHA2560751075923e26b481a5b5555288e1dde9abb2d1bcf326baf6f21bd2b26f71529
SHA512ea87639d5611e0951423bb62c3a47ae88f5a6f71e32fe271f5d45d8c57a544f1c2d177841535318c4116009087d507fe96d9a97da25a725cd16ece1a5c9c5ba8
-
Filesize
371KB
MD5e0a4e08e42e7a09eb820490163f9b08e
SHA11e9fe16ab68bdd29768de81b9f35fdfa0d25824f
SHA256f4513179cd2520208e91a612e84051d0bf983681b7644ad617bb320fc090a96e
SHA51276307bfa92a38074ebf5aa273a49f7d37875d4896bc7709ca04599841e52dabae652416e106fd3ffd81b93da81a6bdd8f932eea75a30b3290b92e6e94887e6db
-
Filesize
371KB
MD5e0a4e08e42e7a09eb820490163f9b08e
SHA11e9fe16ab68bdd29768de81b9f35fdfa0d25824f
SHA256f4513179cd2520208e91a612e84051d0bf983681b7644ad617bb320fc090a96e
SHA51276307bfa92a38074ebf5aa273a49f7d37875d4896bc7709ca04599841e52dabae652416e106fd3ffd81b93da81a6bdd8f932eea75a30b3290b92e6e94887e6db
-
Filesize
136KB
MD5599db5d9bc1979a0374a80d67e8dcaf2
SHA11e0248e2111730577ddb078107d42842a5dde7a9
SHA256b6e7d86bdcd1c03605ca6178cbc818da5d7ccbe6801ef17daff8572a9676a682
SHA51261fd0a2fa4f3fba8fee591cbab592f9b4b5b437264e09c3d770356a5ab9117cb4ec5d4c3dea95bd99bce1fdf1f8472d0891ef97b5b6ae0496ff972cbd33be1af
-
Filesize
136KB
MD5599db5d9bc1979a0374a80d67e8dcaf2
SHA11e0248e2111730577ddb078107d42842a5dde7a9
SHA256b6e7d86bdcd1c03605ca6178cbc818da5d7ccbe6801ef17daff8572a9676a682
SHA51261fd0a2fa4f3fba8fee591cbab592f9b4b5b437264e09c3d770356a5ab9117cb4ec5d4c3dea95bd99bce1fdf1f8472d0891ef97b5b6ae0496ff972cbd33be1af
-
Filesize
340KB
MD579930b2e9882007df8653581fa11d45e
SHA1d46f5fde83116211fca28706412f15ac8443ba2e
SHA2563dab74caff4d12c6fa98434cf14ecb4730a3da14ff31fe251a8120cb4a64e7ac
SHA5129762b7f460b9a850b1d3609d763f96daea42ff65be71c5572d7f0d33f5c3f2f9f6af9c01335b4ba961bc5271cbfeb7ad8e047521240186d38acb20561ac5da95
-
Filesize
340KB
MD579930b2e9882007df8653581fa11d45e
SHA1d46f5fde83116211fca28706412f15ac8443ba2e
SHA2563dab74caff4d12c6fa98434cf14ecb4730a3da14ff31fe251a8120cb4a64e7ac
SHA5129762b7f460b9a850b1d3609d763f96daea42ff65be71c5572d7f0d33f5c3f2f9f6af9c01335b4ba961bc5271cbfeb7ad8e047521240186d38acb20561ac5da95
-
Filesize
340KB
MD579930b2e9882007df8653581fa11d45e
SHA1d46f5fde83116211fca28706412f15ac8443ba2e
SHA2563dab74caff4d12c6fa98434cf14ecb4730a3da14ff31fe251a8120cb4a64e7ac
SHA5129762b7f460b9a850b1d3609d763f96daea42ff65be71c5572d7f0d33f5c3f2f9f6af9c01335b4ba961bc5271cbfeb7ad8e047521240186d38acb20561ac5da95
-
Filesize
340KB
MD579930b2e9882007df8653581fa11d45e
SHA1d46f5fde83116211fca28706412f15ac8443ba2e
SHA2563dab74caff4d12c6fa98434cf14ecb4730a3da14ff31fe251a8120cb4a64e7ac
SHA5129762b7f460b9a850b1d3609d763f96daea42ff65be71c5572d7f0d33f5c3f2f9f6af9c01335b4ba961bc5271cbfeb7ad8e047521240186d38acb20561ac5da95
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b