Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d.exe
Resource
win10v2004-20230220-en
General
-
Target
f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d.exe
-
Size
1.5MB
-
MD5
845a35059710f7b4fbf7738dd51f36a2
-
SHA1
3585bb396556dfa3307e87cd653a64fad9ec249e
-
SHA256
f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d
-
SHA512
96df6a04952c07866b435f4ff5d7ff1f1e3dca5b2c60ba18a95bd29231c41d2a45c766ef6b8086ad7186e675869ca675d0678f548b212342e3d0608a1e1c34ed
-
SSDEEP
24576:dyy7Z7Dk3p5lUYK3UumZYl2VOz1N3bRUOp6QPH5ZB/d1n6/BdqJGLN58+Jl0IG:4USnq+fZTCLOOp6WZZB/C/BdqUN3Ja
Malware Config
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3604-212-0x0000000007B30000-0x0000000008148000-memory.dmp redline_stealer behavioral2/memory/3604-217-0x0000000007920000-0x0000000007986000-memory.dmp redline_stealer behavioral2/memory/3604-221-0x00000000090F0000-0x00000000092B2000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2154245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2154245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2154245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2154245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d1093176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d1093176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d1093176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d1093176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d1093176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2154245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2154245.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation e4718599.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation c0577791.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 13 IoCs
pid Process 1332 v6884295.exe 1516 v0511688.exe 1448 v5163250.exe 768 v6232201.exe 4140 a2154245.exe 3604 b2307028.exe 1868 c0577791.exe 3248 oneetx.exe 3860 d1093176.exe 5000 e4718599.exe 4468 1.exe 1812 f5984887.exe 3556 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 960 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2154245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2154245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d1093176.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5163250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5163250.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6232201.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Windows\\Temp\\1.exe" e4718599.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6884295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0511688.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6884295.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0511688.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v6232201.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 4368 4140 WerFault.exe 89 3728 1868 WerFault.exe 93 4132 1868 WerFault.exe 93 4764 1868 WerFault.exe 93 3992 1868 WerFault.exe 93 3712 1868 WerFault.exe 93 2468 1868 WerFault.exe 93 856 1868 WerFault.exe 93 2200 1868 WerFault.exe 93 4960 1868 WerFault.exe 93 744 1868 WerFault.exe 93 2872 3248 WerFault.exe 112 2336 3248 WerFault.exe 112 1604 3248 WerFault.exe 112 1168 3248 WerFault.exe 112 4500 3248 WerFault.exe 112 1192 3248 WerFault.exe 112 3076 3248 WerFault.exe 112 3260 3248 WerFault.exe 112 2040 3248 WerFault.exe 112 1664 3248 WerFault.exe 112 4368 3248 WerFault.exe 112 1812 3248 WerFault.exe 112 4056 3248 WerFault.exe 112 2288 3248 WerFault.exe 112 1400 5000 WerFault.exe 154 4056 3248 WerFault.exe 112 1328 3556 WerFault.exe 161 4708 3248 WerFault.exe 112 4896 3248 WerFault.exe 112 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4140 a2154245.exe 4140 a2154245.exe 3604 b2307028.exe 3604 b2307028.exe 3860 d1093176.exe 3860 d1093176.exe 4468 1.exe 4468 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4140 a2154245.exe Token: SeDebugPrivilege 3604 b2307028.exe Token: SeDebugPrivilege 3860 d1093176.exe Token: SeDebugPrivilege 5000 e4718599.exe Token: SeDebugPrivilege 4468 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1868 c0577791.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1332 1424 f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d.exe 84 PID 1424 wrote to memory of 1332 1424 f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d.exe 84 PID 1424 wrote to memory of 1332 1424 f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d.exe 84 PID 1332 wrote to memory of 1516 1332 v6884295.exe 85 PID 1332 wrote to memory of 1516 1332 v6884295.exe 85 PID 1332 wrote to memory of 1516 1332 v6884295.exe 85 PID 1516 wrote to memory of 1448 1516 v0511688.exe 86 PID 1516 wrote to memory of 1448 1516 v0511688.exe 86 PID 1516 wrote to memory of 1448 1516 v0511688.exe 86 PID 1448 wrote to memory of 768 1448 v5163250.exe 87 PID 1448 wrote to memory of 768 1448 v5163250.exe 87 PID 1448 wrote to memory of 768 1448 v5163250.exe 87 PID 768 wrote to memory of 4140 768 v6232201.exe 89 PID 768 wrote to memory of 4140 768 v6232201.exe 89 PID 768 wrote to memory of 4140 768 v6232201.exe 89 PID 768 wrote to memory of 3604 768 v6232201.exe 92 PID 768 wrote to memory of 3604 768 v6232201.exe 92 PID 768 wrote to memory of 3604 768 v6232201.exe 92 PID 1448 wrote to memory of 1868 1448 v5163250.exe 93 PID 1448 wrote to memory of 1868 1448 v5163250.exe 93 PID 1448 wrote to memory of 1868 1448 v5163250.exe 93 PID 1868 wrote to memory of 3248 1868 c0577791.exe 112 PID 1868 wrote to memory of 3248 1868 c0577791.exe 112 PID 1868 wrote to memory of 3248 1868 c0577791.exe 112 PID 1516 wrote to memory of 3860 1516 v0511688.exe 116 PID 1516 wrote to memory of 3860 1516 v0511688.exe 116 PID 1516 wrote to memory of 3860 1516 v0511688.exe 116 PID 3248 wrote to memory of 4956 3248 oneetx.exe 130 PID 3248 wrote to memory of 4956 3248 oneetx.exe 130 PID 3248 wrote to memory of 4956 3248 oneetx.exe 130 PID 3248 wrote to memory of 1820 3248 oneetx.exe 136 PID 3248 wrote to memory of 1820 3248 oneetx.exe 136 PID 3248 wrote to memory of 1820 3248 oneetx.exe 136 PID 1820 wrote to memory of 1972 1820 cmd.exe 140 PID 1820 wrote to memory of 1972 1820 cmd.exe 140 PID 1820 wrote to memory of 1972 1820 cmd.exe 140 PID 1820 wrote to memory of 5116 1820 cmd.exe 141 PID 1820 wrote to memory of 5116 1820 cmd.exe 141 PID 1820 wrote to memory of 5116 1820 cmd.exe 141 PID 1820 wrote to memory of 1188 1820 cmd.exe 142 PID 1820 wrote to memory of 1188 1820 cmd.exe 142 PID 1820 wrote to memory of 1188 1820 cmd.exe 142 PID 1820 wrote to memory of 5040 1820 cmd.exe 143 PID 1820 wrote to memory of 5040 1820 cmd.exe 143 PID 1820 wrote to memory of 5040 1820 cmd.exe 143 PID 1820 wrote to memory of 2732 1820 cmd.exe 144 PID 1820 wrote to memory of 2732 1820 cmd.exe 144 PID 1820 wrote to memory of 2732 1820 cmd.exe 144 PID 1820 wrote to memory of 4780 1820 cmd.exe 145 PID 1820 wrote to memory of 4780 1820 cmd.exe 145 PID 1820 wrote to memory of 4780 1820 cmd.exe 145 PID 1332 wrote to memory of 5000 1332 v6884295.exe 154 PID 1332 wrote to memory of 5000 1332 v6884295.exe 154 PID 1332 wrote to memory of 5000 1332 v6884295.exe 154 PID 5000 wrote to memory of 4468 5000 e4718599.exe 155 PID 5000 wrote to memory of 4468 5000 e4718599.exe 155 PID 5000 wrote to memory of 4468 5000 e4718599.exe 155 PID 1424 wrote to memory of 1812 1424 f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d.exe 158 PID 1424 wrote to memory of 1812 1424 f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d.exe 158 PID 1424 wrote to memory of 1812 1424 f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d.exe 158 PID 3248 wrote to memory of 960 3248 oneetx.exe 166 PID 3248 wrote to memory of 960 3248 oneetx.exe 166 PID 3248 wrote to memory of 960 3248 oneetx.exe 166
Processes
-
C:\Users\Admin\AppData\Local\Temp\f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d.exe"C:\Users\Admin\AppData\Local\Temp\f95b1202d2986683061ed4105787a02b8954769ff17b732520fb216008ca108d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6884295.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6884295.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0511688.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0511688.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5163250.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5163250.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6232201.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6232201.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2154245.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2154245.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 10807⤵
- Program crash
PID:4368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2307028.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2307028.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0577791.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0577791.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 6966⤵
- Program crash
PID:3728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 7646⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 8566⤵
- Program crash
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 9686⤵
- Program crash
PID:3992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 9846⤵
- Program crash
PID:3712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 9886⤵
- Program crash
PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 12126⤵
- Program crash
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 12446⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 13206⤵
- Program crash
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 7007⤵
- Program crash
PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 8327⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 8887⤵
- Program crash
PID:1604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 10527⤵
- Program crash
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 10527⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 10527⤵
- Program crash
PID:1192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 11127⤵
- Program crash
PID:3076
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 9927⤵
- Program crash
PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 7007⤵
- Program crash
PID:2040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1972
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:5116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:1188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:5040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:2732
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:4780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 12767⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 8327⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 9927⤵
- Program crash
PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 13007⤵
- Program crash
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 14447⤵
- Program crash
PID:2288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 10927⤵
- Program crash
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 16967⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 16327⤵
- Program crash
PID:4896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 13606⤵
- Program crash
PID:744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d1093176.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d1093176.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e4718599.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e4718599.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 15084⤵
- Program crash
PID:1400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f5984887.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f5984887.exe2⤵
- Executes dropped EXE
PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4140 -ip 41401⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1868 -ip 18681⤵PID:1808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1868 -ip 18681⤵PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1868 -ip 18681⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1868 -ip 18681⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1868 -ip 18681⤵PID:2528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1868 -ip 18681⤵PID:3348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1868 -ip 18681⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1868 -ip 18681⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1868 -ip 18681⤵PID:1672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1868 -ip 18681⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3248 -ip 32481⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3248 -ip 32481⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3248 -ip 32481⤵PID:3884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3248 -ip 32481⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3248 -ip 32481⤵PID:908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3248 -ip 32481⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3248 -ip 32481⤵PID:3864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3248 -ip 32481⤵PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3248 -ip 32481⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3248 -ip 32481⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3248 -ip 32481⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3248 -ip 32481⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3248 -ip 32481⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 3248 -ip 32481⤵PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 5000 -ip 50001⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3248 -ip 32481⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 3202⤵
- Program crash
PID:1328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 3556 -ip 35561⤵PID:1808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 3248 -ip 32481⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 3248 -ip 32481⤵PID:2324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD54921a70930476f0fc5fd8d8bbc00ea67
SHA182ff6aef88eba84c9d6b82b5193ef6c21660523e
SHA25647c400480f8cdb6c8b77aaff69e52c0f0b3cfe002e3cdc77c996b98a4649b09f
SHA512b043066b5d66bcac0e22739539ce6c0ea1f47b0b1ae52562476aadcd67aa6d79a266677cdcbd3d900e2f7afab3737d2b8d2d3257375d12d030a519a56c155d19
-
Filesize
204KB
MD54921a70930476f0fc5fd8d8bbc00ea67
SHA182ff6aef88eba84c9d6b82b5193ef6c21660523e
SHA25647c400480f8cdb6c8b77aaff69e52c0f0b3cfe002e3cdc77c996b98a4649b09f
SHA512b043066b5d66bcac0e22739539ce6c0ea1f47b0b1ae52562476aadcd67aa6d79a266677cdcbd3d900e2f7afab3737d2b8d2d3257375d12d030a519a56c155d19
-
Filesize
1.4MB
MD539f5e9f133db04ccb48e90e944d87913
SHA148b51a777ea6ac63d24dc64d0d4d815dc61b99e7
SHA25675c3d8d9540df8ee57ffd77bb8076822faf39c98fe491f5923f2a95a934b5de2
SHA512268eb3c373ad3e063f26ccfe218f9a35234710a3ef1ce2dfa8e8d2f2f5da49ccf1d95f7dcc462e4b92094b8b193d329d89d78071f721c6951bec447aa47af0c5
-
Filesize
1.4MB
MD539f5e9f133db04ccb48e90e944d87913
SHA148b51a777ea6ac63d24dc64d0d4d815dc61b99e7
SHA25675c3d8d9540df8ee57ffd77bb8076822faf39c98fe491f5923f2a95a934b5de2
SHA512268eb3c373ad3e063f26ccfe218f9a35234710a3ef1ce2dfa8e8d2f2f5da49ccf1d95f7dcc462e4b92094b8b193d329d89d78071f721c6951bec447aa47af0c5
-
Filesize
547KB
MD580439efd92a7c89bc5b69caf2723805d
SHA1c6096d7cb659e6df3fe8a87a3b0b6f3e3d16d8ab
SHA256a7089c31fcf77d594da08bc3cedf467fdd9e8aa513eb5830b436dea0dde97cf6
SHA51244554fdf60cb5d568e11621c0aac00a0a6df4f2e32530499bb7bc07f6cbb4d77da9c4c957f73a3597d08e26f389f2d29cd09259a2f6b0f38d00c7008864f3f16
-
Filesize
547KB
MD580439efd92a7c89bc5b69caf2723805d
SHA1c6096d7cb659e6df3fe8a87a3b0b6f3e3d16d8ab
SHA256a7089c31fcf77d594da08bc3cedf467fdd9e8aa513eb5830b436dea0dde97cf6
SHA51244554fdf60cb5d568e11621c0aac00a0a6df4f2e32530499bb7bc07f6cbb4d77da9c4c957f73a3597d08e26f389f2d29cd09259a2f6b0f38d00c7008864f3f16
-
Filesize
911KB
MD5c64ffab7bd7ac2fa5f2c3ba771b32784
SHA1ed9ed857396fe6473e540586797271c757dcaf91
SHA256d00ad669bde293e37e0eff06d18505ec9db7a532410eb8cc1aa641b40df7a36f
SHA51269b52831fc41327b67ee9cbdc00e60ba9c883df6ec9f11cf8bd119ea3b3582e450c6e8de2c7a0b92f95df11247ef469ecaf52a553fbdc2640215b5ba0938ceb7
-
Filesize
911KB
MD5c64ffab7bd7ac2fa5f2c3ba771b32784
SHA1ed9ed857396fe6473e540586797271c757dcaf91
SHA256d00ad669bde293e37e0eff06d18505ec9db7a532410eb8cc1aa641b40df7a36f
SHA51269b52831fc41327b67ee9cbdc00e60ba9c883df6ec9f11cf8bd119ea3b3582e450c6e8de2c7a0b92f95df11247ef469ecaf52a553fbdc2640215b5ba0938ceb7
-
Filesize
175KB
MD5c209987d184893806e9f34ec8f402326
SHA1f6ba78bbeb6318b2c90c91e4bbac016979994923
SHA256c5383cdb18aa38dd6556b3c3924459ef10cc95dc5f9abe7bc906afb130442e84
SHA51223a60cb601637ef936d656b73f3b055087117b679f6d148486d1dbed8f261ef124e25726e9e400c3535c7d7658635177f0c238369d7b5bbe1c010dc41fb4e904
-
Filesize
175KB
MD5c209987d184893806e9f34ec8f402326
SHA1f6ba78bbeb6318b2c90c91e4bbac016979994923
SHA256c5383cdb18aa38dd6556b3c3924459ef10cc95dc5f9abe7bc906afb130442e84
SHA51223a60cb601637ef936d656b73f3b055087117b679f6d148486d1dbed8f261ef124e25726e9e400c3535c7d7658635177f0c238369d7b5bbe1c010dc41fb4e904
-
Filesize
707KB
MD56ab380d180730a3e0944a097bf832faf
SHA1a4a56834593afb6a93d541a008e96282ac83fad2
SHA25665e69cabaf80e6dd01f11a3704a78912fa156f826183b30fd93cb34707e30471
SHA5127d3471af73a5e916a8928b01bc72fd89af4ff1bf69c069a34318157105862fbf1b139b0ad77bfb75e3a2eb1cf7ba267b8445d6fc0e52f2b384abc5ffb321a4fd
-
Filesize
707KB
MD56ab380d180730a3e0944a097bf832faf
SHA1a4a56834593afb6a93d541a008e96282ac83fad2
SHA25665e69cabaf80e6dd01f11a3704a78912fa156f826183b30fd93cb34707e30471
SHA5127d3471af73a5e916a8928b01bc72fd89af4ff1bf69c069a34318157105862fbf1b139b0ad77bfb75e3a2eb1cf7ba267b8445d6fc0e52f2b384abc5ffb321a4fd
-
Filesize
339KB
MD5ab0e5e43d5b9efdfeb2cc0697677100b
SHA18493616158ccac8244ea09dff2370b89c66b7cfa
SHA2563edd1dc0860e8443500b5583df14c68c495530e554b9b36c2cac38dd9a0b438d
SHA512ea90011f0a28db8edec351ed4d5fb02eca5ba1da9565a7a8d65d0d6124a6d75b87f987cd0ec14574bae1775c6a6661f1f8e8fa70c5f09b7ba279c4065b57078e
-
Filesize
339KB
MD5ab0e5e43d5b9efdfeb2cc0697677100b
SHA18493616158ccac8244ea09dff2370b89c66b7cfa
SHA2563edd1dc0860e8443500b5583df14c68c495530e554b9b36c2cac38dd9a0b438d
SHA512ea90011f0a28db8edec351ed4d5fb02eca5ba1da9565a7a8d65d0d6124a6d75b87f987cd0ec14574bae1775c6a6661f1f8e8fa70c5f09b7ba279c4065b57078e
-
Filesize
416KB
MD57b9b3c75c67295e80e6c203a6e6c0d00
SHA1b14ab29c6629962d35134717447c598e544d8416
SHA256a6173efe0a8ffdda550ef19b5c5a8834af9b095ec83e7a00bed6d046ecd7a72f
SHA5128442ff3819519d04955dc22d8a196170166a94635667e9e10cdd0dabe521d1f40d4cd1f78fbaff0c2da4b8589ac012f56b68fe5f9b9aaf650599a09dcc7cc6c7
-
Filesize
416KB
MD57b9b3c75c67295e80e6c203a6e6c0d00
SHA1b14ab29c6629962d35134717447c598e544d8416
SHA256a6173efe0a8ffdda550ef19b5c5a8834af9b095ec83e7a00bed6d046ecd7a72f
SHA5128442ff3819519d04955dc22d8a196170166a94635667e9e10cdd0dabe521d1f40d4cd1f78fbaff0c2da4b8589ac012f56b68fe5f9b9aaf650599a09dcc7cc6c7
-
Filesize
360KB
MD5aabae9f246eaab52dad0f960c0b91ce4
SHA1c4209765132c4151c953c75a3b2dcb6b2ad238cc
SHA25615955a9440d1fc40380f3e11908c7805dca98c9f1ca28f5fed3a1d38f17ce42c
SHA512514249d332d8bc3dc2142e41f4d7fc6fcfd05f47f5f8b9ca1f7a2f119f196e1a56c360ba60cb0a82a3cba8a37b4fca73548ad01de2bfb12063f2aa3c51ababf9
-
Filesize
360KB
MD5aabae9f246eaab52dad0f960c0b91ce4
SHA1c4209765132c4151c953c75a3b2dcb6b2ad238cc
SHA25615955a9440d1fc40380f3e11908c7805dca98c9f1ca28f5fed3a1d38f17ce42c
SHA512514249d332d8bc3dc2142e41f4d7fc6fcfd05f47f5f8b9ca1f7a2f119f196e1a56c360ba60cb0a82a3cba8a37b4fca73548ad01de2bfb12063f2aa3c51ababf9
-
Filesize
136KB
MD5fb06e7c70052286e31fc07719f85096c
SHA155d924b4e8d13c027eda17351af54e6219175d06
SHA25654d99569f5472e6fb430cd729af13d78cca8dbee4286e1980f974995a08b0851
SHA5127fffb8aee1d9bd13c21658451c690348e2ed4a1c01b60781404454bb6c8cd0f3f8cee8601394987b71cf0b70ee9fb358f9aceda894b4c8027363ceab2ffb2ac9
-
Filesize
136KB
MD5fb06e7c70052286e31fc07719f85096c
SHA155d924b4e8d13c027eda17351af54e6219175d06
SHA25654d99569f5472e6fb430cd729af13d78cca8dbee4286e1980f974995a08b0851
SHA5127fffb8aee1d9bd13c21658451c690348e2ed4a1c01b60781404454bb6c8cd0f3f8cee8601394987b71cf0b70ee9fb358f9aceda894b4c8027363ceab2ffb2ac9
-
Filesize
339KB
MD5ab0e5e43d5b9efdfeb2cc0697677100b
SHA18493616158ccac8244ea09dff2370b89c66b7cfa
SHA2563edd1dc0860e8443500b5583df14c68c495530e554b9b36c2cac38dd9a0b438d
SHA512ea90011f0a28db8edec351ed4d5fb02eca5ba1da9565a7a8d65d0d6124a6d75b87f987cd0ec14574bae1775c6a6661f1f8e8fa70c5f09b7ba279c4065b57078e
-
Filesize
339KB
MD5ab0e5e43d5b9efdfeb2cc0697677100b
SHA18493616158ccac8244ea09dff2370b89c66b7cfa
SHA2563edd1dc0860e8443500b5583df14c68c495530e554b9b36c2cac38dd9a0b438d
SHA512ea90011f0a28db8edec351ed4d5fb02eca5ba1da9565a7a8d65d0d6124a6d75b87f987cd0ec14574bae1775c6a6661f1f8e8fa70c5f09b7ba279c4065b57078e
-
Filesize
339KB
MD5ab0e5e43d5b9efdfeb2cc0697677100b
SHA18493616158ccac8244ea09dff2370b89c66b7cfa
SHA2563edd1dc0860e8443500b5583df14c68c495530e554b9b36c2cac38dd9a0b438d
SHA512ea90011f0a28db8edec351ed4d5fb02eca5ba1da9565a7a8d65d0d6124a6d75b87f987cd0ec14574bae1775c6a6661f1f8e8fa70c5f09b7ba279c4065b57078e
-
Filesize
339KB
MD5ab0e5e43d5b9efdfeb2cc0697677100b
SHA18493616158ccac8244ea09dff2370b89c66b7cfa
SHA2563edd1dc0860e8443500b5583df14c68c495530e554b9b36c2cac38dd9a0b438d
SHA512ea90011f0a28db8edec351ed4d5fb02eca5ba1da9565a7a8d65d0d6124a6d75b87f987cd0ec14574bae1775c6a6661f1f8e8fa70c5f09b7ba279c4065b57078e
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8