Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 07:53
Static task
static1
General
-
Target
dc74708df8924525b2e8b97f7402243a71ad8fb11abea3a3447690cbf556299d.exe
-
Size
1.0MB
-
MD5
abb94ac801105b64ce0e2a2185b2344b
-
SHA1
a80698d0647d9e625d1d8d2e2fcbb19f9f82158a
-
SHA256
dc74708df8924525b2e8b97f7402243a71ad8fb11abea3a3447690cbf556299d
-
SHA512
302ef92bc34ed6bc09ad577fd424507e1235f73cfbae34b01d598d7fdeedb80a276daad8b81eaf9ae698711b745e5b71127efb63dedd5b9bc7dd34342da853bb
-
SSDEEP
24576:2ylAvVuDBTZIF7XjghkT37omKfUT2zSJnryPJ5ve4tYc:F6vkZIF7skXSx2Jnsny
Malware Config
Extracted
amadey
3.70
b50502
http://77.91.124.207
-
install_dir
595f021478
-
install_file
oneetx.exe
-
strings_key
6e3d32d239380a49b6f83128fe71ea01
-
url_paths
/plays/chapter/index.php
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az771125.exe healer behavioral1/memory/1704-28-0x00000000008D0000-0x00000000008DA000-memory.dmp healer behavioral1/memory/4880-53-0x00000000024C0000-0x00000000024DA000-memory.dmp healer behavioral1/memory/4880-55-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/4880-61-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-83-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-81-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-79-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-77-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-75-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-73-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-72-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-69-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-67-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-65-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-63-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-57-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-56-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4880-59-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
az771125.execor8794.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az771125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az771125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az771125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az771125.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor8794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor8794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor8794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor8794.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az771125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az771125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor8794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor8794.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/5036-92-0x0000000002470000-0x00000000024B6000-memory.dmp family_redline behavioral1/memory/5036-93-0x0000000005090000-0x00000000050D4000-memory.dmp family_redline behavioral1/memory/5036-99-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-109-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-126-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-123-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-121-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-119-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-117-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-115-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-111-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-107-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-105-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-103-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-101-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-113-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-97-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-95-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/5036-94-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bu835791.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation bu835791.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
kina5146.exekina4208.exekina5734.exeaz771125.exebu835791.exeoneetx.execor8794.exeddn48s00.exeoneetx.exeoneetx.exepid process 2016 kina5146.exe 3920 kina4208.exe 1080 kina5734.exe 1704 az771125.exe 1540 bu835791.exe 4992 oneetx.exe 4880 cor8794.exe 5036 ddn48s00.exe 5312 oneetx.exe 6120 oneetx.exe -
Processes:
cor8794.exeaz771125.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor8794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor8794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az771125.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
dc74708df8924525b2e8b97f7402243a71ad8fb11abea3a3447690cbf556299d.exekina5146.exekina4208.exekina5734.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dc74708df8924525b2e8b97f7402243a71ad8fb11abea3a3447690cbf556299d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina5146.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina4208.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina5734.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2200 1540 WerFault.exe bu835791.exe 1124 1540 WerFault.exe bu835791.exe 1456 1540 WerFault.exe bu835791.exe 3720 1540 WerFault.exe bu835791.exe 2932 1540 WerFault.exe bu835791.exe 4268 1540 WerFault.exe bu835791.exe 3024 1540 WerFault.exe bu835791.exe 1060 1540 WerFault.exe bu835791.exe 4360 1540 WerFault.exe bu835791.exe 1144 1540 WerFault.exe bu835791.exe 1400 4992 WerFault.exe oneetx.exe 3336 1540 WerFault.exe bu835791.exe 4060 4992 WerFault.exe oneetx.exe 1592 4992 WerFault.exe oneetx.exe 3660 4992 WerFault.exe oneetx.exe 1908 4992 WerFault.exe oneetx.exe 3152 4992 WerFault.exe oneetx.exe 904 4992 WerFault.exe oneetx.exe 3308 4992 WerFault.exe oneetx.exe 364 4992 WerFault.exe oneetx.exe 1512 4992 WerFault.exe oneetx.exe 4584 4992 WerFault.exe oneetx.exe 4820 4992 WerFault.exe oneetx.exe 3268 4880 WerFault.exe cor8794.exe 5280 4992 WerFault.exe oneetx.exe 2028 5312 WerFault.exe oneetx.exe 6032 6120 WerFault.exe oneetx.exe 1456 4992 WerFault.exe oneetx.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.exekina5146.exeoneetx.execor8794.exebu835791.exeddn48s00.exedc74708df8924525b2e8b97f7402243a71ad8fb11abea3a3447690cbf556299d.exekina4208.exekina5734.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina5146.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cor8794.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bu835791.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddn48s00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc74708df8924525b2e8b97f7402243a71ad8fb11abea3a3447690cbf556299d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina4208.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina5734.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
az771125.execor8794.exepid process 1704 az771125.exe 1704 az771125.exe 4880 cor8794.exe 4880 cor8794.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
az771125.execor8794.exeddn48s00.exedescription pid process Token: SeDebugPrivilege 1704 az771125.exe Token: SeDebugPrivilege 4880 cor8794.exe Token: SeDebugPrivilege 5036 ddn48s00.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
bu835791.exepid process 1540 bu835791.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
dc74708df8924525b2e8b97f7402243a71ad8fb11abea3a3447690cbf556299d.exekina5146.exekina4208.exekina5734.exebu835791.exeoneetx.exedescription pid process target process PID 4452 wrote to memory of 2016 4452 dc74708df8924525b2e8b97f7402243a71ad8fb11abea3a3447690cbf556299d.exe kina5146.exe PID 4452 wrote to memory of 2016 4452 dc74708df8924525b2e8b97f7402243a71ad8fb11abea3a3447690cbf556299d.exe kina5146.exe PID 4452 wrote to memory of 2016 4452 dc74708df8924525b2e8b97f7402243a71ad8fb11abea3a3447690cbf556299d.exe kina5146.exe PID 2016 wrote to memory of 3920 2016 kina5146.exe kina4208.exe PID 2016 wrote to memory of 3920 2016 kina5146.exe kina4208.exe PID 2016 wrote to memory of 3920 2016 kina5146.exe kina4208.exe PID 3920 wrote to memory of 1080 3920 kina4208.exe kina5734.exe PID 3920 wrote to memory of 1080 3920 kina4208.exe kina5734.exe PID 3920 wrote to memory of 1080 3920 kina4208.exe kina5734.exe PID 1080 wrote to memory of 1704 1080 kina5734.exe az771125.exe PID 1080 wrote to memory of 1704 1080 kina5734.exe az771125.exe PID 1080 wrote to memory of 1540 1080 kina5734.exe bu835791.exe PID 1080 wrote to memory of 1540 1080 kina5734.exe bu835791.exe PID 1080 wrote to memory of 1540 1080 kina5734.exe bu835791.exe PID 1540 wrote to memory of 4992 1540 bu835791.exe oneetx.exe PID 1540 wrote to memory of 4992 1540 bu835791.exe oneetx.exe PID 1540 wrote to memory of 4992 1540 bu835791.exe oneetx.exe PID 3920 wrote to memory of 4880 3920 kina4208.exe cor8794.exe PID 3920 wrote to memory of 4880 3920 kina4208.exe cor8794.exe PID 3920 wrote to memory of 4880 3920 kina4208.exe cor8794.exe PID 4992 wrote to memory of 3360 4992 oneetx.exe schtasks.exe PID 4992 wrote to memory of 3360 4992 oneetx.exe schtasks.exe PID 4992 wrote to memory of 3360 4992 oneetx.exe schtasks.exe PID 2016 wrote to memory of 5036 2016 kina5146.exe ddn48s00.exe PID 2016 wrote to memory of 5036 2016 kina5146.exe ddn48s00.exe PID 2016 wrote to memory of 5036 2016 kina5146.exe ddn48s00.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc74708df8924525b2e8b97f7402243a71ad8fb11abea3a3447690cbf556299d.exe"C:\Users\Admin\AppData\Local\Temp\dc74708df8924525b2e8b97f7402243a71ad8fb11abea3a3447690cbf556299d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina5146.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina5146.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4208.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4208.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5734.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5734.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az771125.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az771125.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu835791.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu835791.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 7046⤵
- Program crash
PID:2200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 7646⤵
- Program crash
PID:1124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 8566⤵
- Program crash
PID:1456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 9726⤵
- Program crash
PID:3720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 9846⤵
- Program crash
PID:2932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 9486⤵
- Program crash
PID:4268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 12046⤵
- Program crash
PID:3024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 12246⤵
- Program crash
PID:1060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 13126⤵
- Program crash
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 6927⤵
- Program crash
PID:1400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 10047⤵
- Program crash
PID:4060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 10727⤵
- Program crash
PID:1592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 10807⤵
- Program crash
PID:3660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 11127⤵
- Program crash
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 10047⤵
- Program crash
PID:3152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 11207⤵
- Program crash
PID:904 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 9927⤵
- Program crash
PID:3308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 8007⤵
- Program crash
PID:364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 7687⤵
- Program crash
PID:1512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 9887⤵
- Program crash
PID:4584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 14367⤵
- Program crash
PID:4820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 10807⤵
- Program crash
PID:5280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 14167⤵
- Program crash
PID:1456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 17166⤵
- Program crash
PID:1144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 7566⤵
- Program crash
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor8794.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor8794.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 10805⤵
- Program crash
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddn48s00.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddn48s00.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1540 -ip 15401⤵PID:960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1540 -ip 15401⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1540 -ip 15401⤵PID:2824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1540 -ip 15401⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1540 -ip 15401⤵PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1540 -ip 15401⤵PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1540 -ip 15401⤵PID:2580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1540 -ip 15401⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1540 -ip 15401⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1540 -ip 15401⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4992 -ip 49921⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1540 -ip 15401⤵PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4992 -ip 49921⤵PID:2716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4992 -ip 49921⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4992 -ip 49921⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4992 -ip 49921⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4992 -ip 49921⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4992 -ip 49921⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4992 -ip 49921⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4992 -ip 49921⤵PID:2940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4992 -ip 49921⤵PID:696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 4992 -ip 49921⤵PID:2460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 4992 -ip 49921⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 4880 -ip 48801⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4992 -ip 49921⤵PID:5248
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:5312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5312 -s 2162⤵
- Program crash
PID:2028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 5312 -ip 53121⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:6120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6120 -s 3122⤵
- Program crash
PID:6032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 6120 -ip 61201⤵PID:6080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 4992 -ip 49921⤵PID:3484
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
920KB
MD57225da0080072d0b025fefd5e8a8db7b
SHA173c9eefc3597f171ff7a0f1870f46f694bab8de2
SHA2560d1f9534a931f37c02622cb4dce0fc3d88956df5d246a001ff317faddf94e0ca
SHA51270fedf95c7b0ad1dc20e35d8f362d2dab48e89b95e1a708ca6b7c511324428309fd9e7a69de99e70dd40d26040fe86fc8516ca0a5fb49860cc5ba0b26604c0aa
-
Filesize
298KB
MD51b496161177a197f08c50a9422684a41
SHA17c319d557994dea0b4b16fa4f12db9081f722957
SHA2564e6af3e52fc63d3d4aa297d9e42cc73775f444d3c6cc22cd28f954f568b7712f
SHA5122c2e52b379d1713932b3a306dd3092a20cb104eaf0d18a238f59262ce496ca13b3a263b6ff502596cd2d164d1fb5f29411a369b7e27a3be5086172d7b2ccfdc3
-
Filesize
588KB
MD5b320beb0120847b5b435d5f943b5abcb
SHA10caaaa348a0b2dadf84593cab25222fded589d14
SHA25672c2e53a1325b7487e3cf9e4d2e361aac8b241be02f06017c86f9b2767a154f7
SHA5129d5fc261653e52b3a91679f4544c3a2c30ae391a903d3eec64512107d1d639ea8e642946c39ede2df473332cc6f1c48ee91553b3efa504186fa7c6f84b34b63e
-
Filesize
239KB
MD5d7334a72cf45d92f59388d5c8d4e52a2
SHA1b476064a6c29157b08f5e6e1dda598c6cbaa556f
SHA256236ef03f394f50034e40dd2274c53b6f97946b6d43ee6d49e819a183b2e5f23a
SHA512cdfded6b86989ec455f111549dd6e9adddd263557a6b08728928cc4d0ae956c6a7e6531b7f91f0428ed166d7afd3063d7b64b4fef94ba65bca49e3c94cfcd65a
-
Filesize
315KB
MD562a3c3439c5de1bfedf62b39b215a0a2
SHA1e2aa4c014f8c4af80ec72e83c593fdc136577665
SHA256930bd058bd2700ab3d33819bc2980f81bb7dfb23d8b670a81d9bc9ffd0a726a3
SHA512c5b1708ca46e87fd8a47dc16184f81fe1a3ed1a6fb45b4b00b9088126b29f783cc5fc4140e6ed2ff6ab5c38d95530ffce1c0ccf594566a55d288506f3b904c76
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
231KB
MD527d46213f24b50b85930d758e983dcbd
SHA1f2271208cbc2a0fa43bb26c7ebcf1775b10ee53a
SHA2567bb18f7c0b2597b3f9b0359894960deafb4ddf0f4f71c03ad88d7ca2742ffeff
SHA51261ede5ede75f1d84d63731f13ab0477c09e710fcf6e1868b5a671d4f600bcdf13d824f1078abebf443b18ccbb19aebed603373fe6d8c42f0dcc2b0d65e4a5128