Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:47
Static task
static1
Behavioral task
behavioral1
Sample
d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848.exe
Resource
win10v2004-20230220-en
General
-
Target
d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848.exe
-
Size
1.5MB
-
MD5
f3e1ce6b51684988e05a40c717e2f6a5
-
SHA1
6c217d41cc10b2091bc3d0140e261e3e28fbc05a
-
SHA256
d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848
-
SHA512
e03d2bf7e1df5352327a307b69ae4370470459c51010f90bf2fd7efc8c2725ca32d62190e3ebb7a337a3167bbe8a2f8daf75c8722a524e3dc7c04a387080d96a
-
SSDEEP
24576:1y6POjKLX5AtbFAPq2L4hvkCoPGkkDo7h6VA4dSuQxGtbUvc7ViNYATqZ2Iy:Q6PW4JyhAPrPC19oVAychiJTqAI
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/5112-209-0x000000000B110000-0x000000000B728000-memory.dmp redline_stealer behavioral2/memory/5112-216-0x000000000B0A0000-0x000000000B106000-memory.dmp redline_stealer behavioral2/memory/5112-217-0x000000000C460000-0x000000000C622000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d4237420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d4237420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4714413.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4714413.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4714413.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d4237420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d4237420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d4237420.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4714413.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4714413.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4714413.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation c3059602.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation e6092251.exe -
Executes dropped EXE 13 IoCs
pid Process 1860 v8392539.exe 4264 v5770939.exe 4924 v3133990.exe 4172 v6994644.exe 4920 a4714413.exe 5112 b6921514.exe 4464 c3059602.exe 456 oneetx.exe 3504 d4237420.exe 3816 e6092251.exe 1444 1.exe 4256 f4119783.exe 1508 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3760 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4714413.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4714413.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d4237420.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8392539.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5770939.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3133990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v6994644.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8392539.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5770939.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3133990.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6994644.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 4552 4920 WerFault.exe 87 2080 4464 WerFault.exe 99 3800 4464 WerFault.exe 99 2232 4464 WerFault.exe 99 4768 4464 WerFault.exe 99 1528 4464 WerFault.exe 99 4048 4464 WerFault.exe 99 1472 4464 WerFault.exe 99 1264 4464 WerFault.exe 99 4624 4464 WerFault.exe 99 4100 4464 WerFault.exe 99 384 456 WerFault.exe 118 464 456 WerFault.exe 118 1332 456 WerFault.exe 118 316 456 WerFault.exe 118 5060 456 WerFault.exe 118 4116 456 WerFault.exe 118 916 456 WerFault.exe 118 2240 456 WerFault.exe 118 4672 456 WerFault.exe 118 2256 456 WerFault.exe 118 2640 456 WerFault.exe 118 3644 456 WerFault.exe 118 3080 456 WerFault.exe 118 4460 3816 WerFault.exe 158 4244 456 WerFault.exe 118 668 1508 WerFault.exe 165 1488 456 WerFault.exe 118 348 456 WerFault.exe 118 388 456 WerFault.exe 118 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4920 a4714413.exe 4920 a4714413.exe 5112 b6921514.exe 5112 b6921514.exe 3504 d4237420.exe 3504 d4237420.exe 1444 1.exe 1444 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4920 a4714413.exe Token: SeDebugPrivilege 5112 b6921514.exe Token: SeDebugPrivilege 3504 d4237420.exe Token: SeDebugPrivilege 3816 e6092251.exe Token: SeDebugPrivilege 1444 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4464 c3059602.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3704 wrote to memory of 1860 3704 d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848.exe 83 PID 3704 wrote to memory of 1860 3704 d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848.exe 83 PID 3704 wrote to memory of 1860 3704 d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848.exe 83 PID 1860 wrote to memory of 4264 1860 v8392539.exe 84 PID 1860 wrote to memory of 4264 1860 v8392539.exe 84 PID 1860 wrote to memory of 4264 1860 v8392539.exe 84 PID 4264 wrote to memory of 4924 4264 v5770939.exe 85 PID 4264 wrote to memory of 4924 4264 v5770939.exe 85 PID 4264 wrote to memory of 4924 4264 v5770939.exe 85 PID 4924 wrote to memory of 4172 4924 v3133990.exe 86 PID 4924 wrote to memory of 4172 4924 v3133990.exe 86 PID 4924 wrote to memory of 4172 4924 v3133990.exe 86 PID 4172 wrote to memory of 4920 4172 v6994644.exe 87 PID 4172 wrote to memory of 4920 4172 v6994644.exe 87 PID 4172 wrote to memory of 4920 4172 v6994644.exe 87 PID 4172 wrote to memory of 5112 4172 v6994644.exe 97 PID 4172 wrote to memory of 5112 4172 v6994644.exe 97 PID 4172 wrote to memory of 5112 4172 v6994644.exe 97 PID 4924 wrote to memory of 4464 4924 v3133990.exe 99 PID 4924 wrote to memory of 4464 4924 v3133990.exe 99 PID 4924 wrote to memory of 4464 4924 v3133990.exe 99 PID 4464 wrote to memory of 456 4464 c3059602.exe 118 PID 4464 wrote to memory of 456 4464 c3059602.exe 118 PID 4464 wrote to memory of 456 4464 c3059602.exe 118 PID 4264 wrote to memory of 3504 4264 v5770939.exe 123 PID 4264 wrote to memory of 3504 4264 v5770939.exe 123 PID 4264 wrote to memory of 3504 4264 v5770939.exe 123 PID 456 wrote to memory of 4764 456 oneetx.exe 138 PID 456 wrote to memory of 4764 456 oneetx.exe 138 PID 456 wrote to memory of 4764 456 oneetx.exe 138 PID 456 wrote to memory of 4160 456 oneetx.exe 142 PID 456 wrote to memory of 4160 456 oneetx.exe 142 PID 456 wrote to memory of 4160 456 oneetx.exe 142 PID 4160 wrote to memory of 2304 4160 cmd.exe 146 PID 4160 wrote to memory of 2304 4160 cmd.exe 146 PID 4160 wrote to memory of 2304 4160 cmd.exe 146 PID 4160 wrote to memory of 556 4160 cmd.exe 147 PID 4160 wrote to memory of 556 4160 cmd.exe 147 PID 4160 wrote to memory of 556 4160 cmd.exe 147 PID 4160 wrote to memory of 2716 4160 cmd.exe 148 PID 4160 wrote to memory of 2716 4160 cmd.exe 148 PID 4160 wrote to memory of 2716 4160 cmd.exe 148 PID 4160 wrote to memory of 3588 4160 cmd.exe 151 PID 4160 wrote to memory of 3588 4160 cmd.exe 151 PID 4160 wrote to memory of 3588 4160 cmd.exe 151 PID 4160 wrote to memory of 1684 4160 cmd.exe 149 PID 4160 wrote to memory of 1684 4160 cmd.exe 149 PID 4160 wrote to memory of 1684 4160 cmd.exe 149 PID 4160 wrote to memory of 3892 4160 cmd.exe 150 PID 4160 wrote to memory of 3892 4160 cmd.exe 150 PID 4160 wrote to memory of 3892 4160 cmd.exe 150 PID 1860 wrote to memory of 3816 1860 v8392539.exe 158 PID 1860 wrote to memory of 3816 1860 v8392539.exe 158 PID 1860 wrote to memory of 3816 1860 v8392539.exe 158 PID 3816 wrote to memory of 1444 3816 e6092251.exe 159 PID 3816 wrote to memory of 1444 3816 e6092251.exe 159 PID 3816 wrote to memory of 1444 3816 e6092251.exe 159 PID 3704 wrote to memory of 4256 3704 d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848.exe 162 PID 3704 wrote to memory of 4256 3704 d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848.exe 162 PID 3704 wrote to memory of 4256 3704 d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848.exe 162 PID 456 wrote to memory of 3760 456 oneetx.exe 170 PID 456 wrote to memory of 3760 456 oneetx.exe 170 PID 456 wrote to memory of 3760 456 oneetx.exe 170
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848.exe"C:\Users\Admin\AppData\Local\Temp\d1d18a433168a3e5a440ea7c5f9cdc5340d3a5a97be5f96e0c57dec605b1a848.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8392539.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8392539.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5770939.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5770939.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3133990.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3133990.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6994644.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6994644.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4714413.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4714413.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 10807⤵
- Program crash
PID:4552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6921514.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6921514.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3059602.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3059602.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 6966⤵
- Program crash
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 7486⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 8606⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 9526⤵
- Program crash
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 9766⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 9766⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 12086⤵
- Program crash
PID:1472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 12286⤵
- Program crash
PID:1264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 13166⤵
- Program crash
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 6927⤵
- Program crash
PID:384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 8287⤵
- Program crash
PID:464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 8687⤵
- Program crash
PID:1332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 10527⤵
- Program crash
PID:316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 10727⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 10727⤵
- Program crash
PID:4116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 10527⤵
- Program crash
PID:916
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 9927⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 7687⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:556
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:2716
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:1684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:3892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3588
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 12927⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 12687⤵
- Program crash
PID:2640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 12847⤵
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 7767⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 11327⤵
- Program crash
PID:4244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 16447⤵
- Program crash
PID:1488
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 15847⤵
- Program crash
PID:348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 13767⤵
- Program crash
PID:388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 8686⤵
- Program crash
PID:4100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d4237420.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d4237420.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e6092251.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e6092251.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3816 -s 14924⤵
- Program crash
PID:4460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f4119783.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f4119783.exe2⤵
- Executes dropped EXE
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4920 -ip 49201⤵PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4464 -ip 44641⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4464 -ip 44641⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4464 -ip 44641⤵PID:1660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4464 -ip 44641⤵PID:4068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4464 -ip 44641⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4464 -ip 44641⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4464 -ip 44641⤵PID:2148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4464 -ip 44641⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4464 -ip 44641⤵PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 4464 -ip 44641⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 456 -ip 4561⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 456 -ip 4561⤵PID:2672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 456 -ip 4561⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 456 -ip 4561⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 456 -ip 4561⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 456 -ip 4561⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 456 -ip 4561⤵PID:2932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 456 -ip 4561⤵PID:1784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 456 -ip 4561⤵PID:2520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 456 -ip 4561⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 456 -ip 4561⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 456 -ip 4561⤵PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 456 -ip 4561⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3816 -ip 38161⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 456 -ip 4561⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 3162⤵
- Program crash
PID:668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1508 -ip 15081⤵PID:208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 456 -ip 4561⤵PID:696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 456 -ip 4561⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 456 -ip 4561⤵PID:1420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5ad031eb5bd70c0a5d6fb8838c145b192
SHA1c5009e5ac231bc732eb99ffbe1807fd818f35630
SHA256d6fcf8621557f056f2eb7ac7ffc030f16d4403d8086c5d62672d8d8ae79106ff
SHA51231f7931bfb3166dd664c45dbf0bb252927caf3db5cd12d16e7fdc30909f714a57156a16679435379a133dd9f24b4f7782962930f03f6d00ab3dc44a8b9ce603e
-
Filesize
206KB
MD5ad031eb5bd70c0a5d6fb8838c145b192
SHA1c5009e5ac231bc732eb99ffbe1807fd818f35630
SHA256d6fcf8621557f056f2eb7ac7ffc030f16d4403d8086c5d62672d8d8ae79106ff
SHA51231f7931bfb3166dd664c45dbf0bb252927caf3db5cd12d16e7fdc30909f714a57156a16679435379a133dd9f24b4f7782962930f03f6d00ab3dc44a8b9ce603e
-
Filesize
1.3MB
MD5769edd1005d3ca5a600c01dbb3795176
SHA158b8eb6c1bc74cd306bf2bf2aeb95a86834eae9b
SHA256f987bb3dad659f10463463f038d59908b4e6871863a87c400183efc1f53cf830
SHA51206e60143b3f4835ebfe9e645ac2c6b3a7f481bbd47af68dbf6b61170796263c93f5175184dc12434fba4c428d6f2276b9990fb89c5250e90a4783c24959fc1be
-
Filesize
1.3MB
MD5769edd1005d3ca5a600c01dbb3795176
SHA158b8eb6c1bc74cd306bf2bf2aeb95a86834eae9b
SHA256f987bb3dad659f10463463f038d59908b4e6871863a87c400183efc1f53cf830
SHA51206e60143b3f4835ebfe9e645ac2c6b3a7f481bbd47af68dbf6b61170796263c93f5175184dc12434fba4c428d6f2276b9990fb89c5250e90a4783c24959fc1be
-
Filesize
502KB
MD5d83cab89c648bc0d486cc590c77aca33
SHA18bb8b19622c9d890b6e37d1817aea93bb54b75b1
SHA256de5919a4face5653c0964f1b8cf36a643c2984dffb84c260119a6d09f41c66ac
SHA51249a443079d693c7faf14e96eaabe71b93f36c8be4253f2740f5b160b7f3681ca5a5f934a91de2abc5893db8dd36de9af65bec956e3f00b0a678c0ffeb92f8b59
-
Filesize
502KB
MD5d83cab89c648bc0d486cc590c77aca33
SHA18bb8b19622c9d890b6e37d1817aea93bb54b75b1
SHA256de5919a4face5653c0964f1b8cf36a643c2984dffb84c260119a6d09f41c66ac
SHA51249a443079d693c7faf14e96eaabe71b93f36c8be4253f2740f5b160b7f3681ca5a5f934a91de2abc5893db8dd36de9af65bec956e3f00b0a678c0ffeb92f8b59
-
Filesize
866KB
MD59dc361dec6dee8c95e384bac84bcfe84
SHA1fede4822b9c7511485b0d5c5b9321faf48c4d28d
SHA2561ef67f7fd4e00d0d3c0486902a2291a8e95834d228c503a20278eb4d34681e94
SHA512dbbd2082e0c1c41c612dbd08a4ccf3cc171b6f2fb9244f050c474e468bea0acf10fe9de93c1ed73f1eae2373bc0a497f9325eb49d21c7ae8fffbb622ab3882a5
-
Filesize
866KB
MD59dc361dec6dee8c95e384bac84bcfe84
SHA1fede4822b9c7511485b0d5c5b9321faf48c4d28d
SHA2561ef67f7fd4e00d0d3c0486902a2291a8e95834d228c503a20278eb4d34681e94
SHA512dbbd2082e0c1c41c612dbd08a4ccf3cc171b6f2fb9244f050c474e468bea0acf10fe9de93c1ed73f1eae2373bc0a497f9325eb49d21c7ae8fffbb622ab3882a5
-
Filesize
179KB
MD54c50c0d9ce1506f04cf48b9be07bd7d9
SHA1caa48cbcbbd22d10e94f1c7a7c993787d9a4b616
SHA256be0c0088ea25744e20d96078cae21e3bb8d0414061e3c0d5fa2aac0222d52e05
SHA512c83879e17a4e1617cdc9b3415b99bd1c72b22e1a66a0933cb8d656ed57402922665dc2b06ed39565faa3d7becd880b90eddb1311353cc84ea6d80fb50319acb5
-
Filesize
179KB
MD54c50c0d9ce1506f04cf48b9be07bd7d9
SHA1caa48cbcbbd22d10e94f1c7a7c993787d9a4b616
SHA256be0c0088ea25744e20d96078cae21e3bb8d0414061e3c0d5fa2aac0222d52e05
SHA512c83879e17a4e1617cdc9b3415b99bd1c72b22e1a66a0933cb8d656ed57402922665dc2b06ed39565faa3d7becd880b90eddb1311353cc84ea6d80fb50319acb5
-
Filesize
663KB
MD553fd8e4f9480ca2df2a2a59fb002df21
SHA12071008fa4b79274d69e8e31f2364761f952290f
SHA2561f6c17b30b642843cb7734d2525ff21294d084b762cc2c444b1f46d044340d10
SHA5125c0774ea99874f5f4256de54cef2e2fec9d852c295896b411accc4db46e0c18378129659b6bc97077d2bb5858b2bbfa6ba1b13480563b013e57f30eac1cce8c1
-
Filesize
663KB
MD553fd8e4f9480ca2df2a2a59fb002df21
SHA12071008fa4b79274d69e8e31f2364761f952290f
SHA2561f6c17b30b642843cb7734d2525ff21294d084b762cc2c444b1f46d044340d10
SHA5125c0774ea99874f5f4256de54cef2e2fec9d852c295896b411accc4db46e0c18378129659b6bc97077d2bb5858b2bbfa6ba1b13480563b013e57f30eac1cce8c1
-
Filesize
295KB
MD50f1cb54bf7b164ec328d625cc479f4ce
SHA17afd3f4d419061d48011e1bfff521e694b9736dd
SHA2569b1262f6fdcbe020bac846517ea749000b64b27778e2f635e997f30b4a6f7d1e
SHA512a2bae9291930a8f3212ad51263fac27bed76ffcc654aa7278b2f7a9a7378f218f3f5656a88f53e37eac8ad32a0788fca4c010b46ef821778d92382e76ae4435f
-
Filesize
295KB
MD50f1cb54bf7b164ec328d625cc479f4ce
SHA17afd3f4d419061d48011e1bfff521e694b9736dd
SHA2569b1262f6fdcbe020bac846517ea749000b64b27778e2f635e997f30b4a6f7d1e
SHA512a2bae9291930a8f3212ad51263fac27bed76ffcc654aa7278b2f7a9a7378f218f3f5656a88f53e37eac8ad32a0788fca4c010b46ef821778d92382e76ae4435f
-
Filesize
393KB
MD57fc841b43cbe704861f6d0f61843175c
SHA1bf5b1b3540c7ff31058e45332c819e28ae45016c
SHA2563c5ec1d9948669d845ca01ec7a267c6c861a915a708490eb15050b43ac2b3e40
SHA512eb73b09154c66471687215051e03c4fdc238c711cf226318257ea2d96bce613186426f817ce869dfff14c8aaaa3e77a7bd4a8ab37c24a42beba699d50c9bf558
-
Filesize
393KB
MD57fc841b43cbe704861f6d0f61843175c
SHA1bf5b1b3540c7ff31058e45332c819e28ae45016c
SHA2563c5ec1d9948669d845ca01ec7a267c6c861a915a708490eb15050b43ac2b3e40
SHA512eb73b09154c66471687215051e03c4fdc238c711cf226318257ea2d96bce613186426f817ce869dfff14c8aaaa3e77a7bd4a8ab37c24a42beba699d50c9bf558
-
Filesize
315KB
MD560f61938bd3ffd648729fb3a188d9d82
SHA1eab9e8c714a0f08de8d0b62cdee627e5816f3fb0
SHA2569021b39f67fe1eca35d424557b5c5e19eab7396b10edad8944d92c1a15ef344f
SHA512637c17ab6ff495bfe4eefa48f1210995f19429b6a6466b306c0b70d94e4cdd0375e0c0f8545aeb1ac5e1e3db17ba5f90873709c16e225b2765575b28c27e2ae1
-
Filesize
315KB
MD560f61938bd3ffd648729fb3a188d9d82
SHA1eab9e8c714a0f08de8d0b62cdee627e5816f3fb0
SHA2569021b39f67fe1eca35d424557b5c5e19eab7396b10edad8944d92c1a15ef344f
SHA512637c17ab6ff495bfe4eefa48f1210995f19429b6a6466b306c0b70d94e4cdd0375e0c0f8545aeb1ac5e1e3db17ba5f90873709c16e225b2765575b28c27e2ae1
-
Filesize
168KB
MD5785406abe8b3c9031a2c60e6e819d484
SHA10ae8a70a63e5fc5aea5c41dbb6c0f00987e72f92
SHA256f6567f954554c633e1a7222ef43b0c5679ee1317e8d94a852de0ce6b37c1ac55
SHA512d8d0e6d4632f8754be9316ed6d98bf5431598fe732fa04c9497af8213abc2c16133900447afd0fbb08ec97687302e9fad94f52e2ff48cf183006cb071543dc67
-
Filesize
168KB
MD5785406abe8b3c9031a2c60e6e819d484
SHA10ae8a70a63e5fc5aea5c41dbb6c0f00987e72f92
SHA256f6567f954554c633e1a7222ef43b0c5679ee1317e8d94a852de0ce6b37c1ac55
SHA512d8d0e6d4632f8754be9316ed6d98bf5431598fe732fa04c9497af8213abc2c16133900447afd0fbb08ec97687302e9fad94f52e2ff48cf183006cb071543dc67
-
Filesize
295KB
MD50f1cb54bf7b164ec328d625cc479f4ce
SHA17afd3f4d419061d48011e1bfff521e694b9736dd
SHA2569b1262f6fdcbe020bac846517ea749000b64b27778e2f635e997f30b4a6f7d1e
SHA512a2bae9291930a8f3212ad51263fac27bed76ffcc654aa7278b2f7a9a7378f218f3f5656a88f53e37eac8ad32a0788fca4c010b46ef821778d92382e76ae4435f
-
Filesize
295KB
MD50f1cb54bf7b164ec328d625cc479f4ce
SHA17afd3f4d419061d48011e1bfff521e694b9736dd
SHA2569b1262f6fdcbe020bac846517ea749000b64b27778e2f635e997f30b4a6f7d1e
SHA512a2bae9291930a8f3212ad51263fac27bed76ffcc654aa7278b2f7a9a7378f218f3f5656a88f53e37eac8ad32a0788fca4c010b46ef821778d92382e76ae4435f
-
Filesize
295KB
MD50f1cb54bf7b164ec328d625cc479f4ce
SHA17afd3f4d419061d48011e1bfff521e694b9736dd
SHA2569b1262f6fdcbe020bac846517ea749000b64b27778e2f635e997f30b4a6f7d1e
SHA512a2bae9291930a8f3212ad51263fac27bed76ffcc654aa7278b2f7a9a7378f218f3f5656a88f53e37eac8ad32a0788fca4c010b46ef821778d92382e76ae4435f
-
Filesize
295KB
MD50f1cb54bf7b164ec328d625cc479f4ce
SHA17afd3f4d419061d48011e1bfff521e694b9736dd
SHA2569b1262f6fdcbe020bac846517ea749000b64b27778e2f635e997f30b4a6f7d1e
SHA512a2bae9291930a8f3212ad51263fac27bed76ffcc654aa7278b2f7a9a7378f218f3f5656a88f53e37eac8ad32a0788fca4c010b46ef821778d92382e76ae4435f
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b