Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe
Resource
win10v2004-20241007-en
General
-
Target
4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe
-
Size
2.3MB
-
MD5
aa25a6dbf0319ac7466e5e4c8b7ee4a3
-
SHA1
f5cfc23ae0d2785f5aae32a07eaf15f9cfc4ac24
-
SHA256
4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e
-
SHA512
ccd6232ae5918110ef911fbd27de2619cc2a1cbf1b08029b4953166bdaaa2ba087d418726e612dc84afc803e1cc95229834e1b0c91696471b8b08e4c6ff080df
-
SSDEEP
49152:J84+V9pjc8VJiy7jHrpb3KPyT5cRIdesz1E:JEV9Rv7jLpjKKVGIdZ1E
Malware Config
Extracted
arkei
Default
188.212.124.13/lYWcN6H7B1.php
Extracted
redline
ОШИБКА
185.183.32.161:45391
-
auth_value
d18b47a36849f89352e431c80fc6cb5d
Extracted
redline
11/13
94.103.9.133:1169
-
auth_value
b69e61a3d7a039daa16500dfdc1eaa12
Signatures
-
Arkei family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2148-124-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline behavioral1/memory/2148-128-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline behavioral1/memory/2148-127-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline behavioral1/memory/1488-137-0x00000000000B0000-0x00000000000E8000-memory.dmp family_redline behavioral1/memory/1488-141-0x00000000000B0000-0x00000000000E8000-memory.dmp family_redline behavioral1/memory/1488-140-0x00000000000B0000-0x00000000000E8000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 11 IoCs
Processes:
MarsBuild_2021-11-14_11-20.execlean.execlean.exeOQTGVRp.exeQdUPABU.exeForma.exe.comForma.exe.comUdi.exe.comUdi.exe.comRegAsm.exeRegAsm.exepid Process 2300 MarsBuild_2021-11-14_11-20.exe 2888 clean.exe 2776 clean.exe 2748 OQTGVRp.exe 2864 QdUPABU.exe 2800 Forma.exe.com 780 Forma.exe.com 1164 Udi.exe.com 1516 Udi.exe.com 2148 RegAsm.exe 1488 RegAsm.exe -
Loads dropped DLL 25 IoCs
Processes:
4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.execmd.exeForma.exe.comcmd.exeUdi.exe.comUdi.exe.comRegAsm.exeForma.exe.comRegAsm.exepid Process 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 2612 cmd.exe 2800 Forma.exe.com 1036 cmd.exe 1164 Udi.exe.com 1516 Udi.exe.com 2148 RegAsm.exe 780 Forma.exe.com 1488 RegAsm.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
OQTGVRp.exeQdUPABU.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" OQTGVRp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" QdUPABU.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Udi.exe.comForma.exe.comdescription pid Process procid_target PID 1516 set thread context of 2148 1516 Udi.exe.com 54 PID 780 set thread context of 1488 780 Forma.exe.com 55 -
Processes:
resource yara_rule behavioral1/memory/2776-57-0x0000000000250000-0x0000000000393000-memory.dmp upx behavioral1/files/0x0008000000012117-55.dat upx behavioral1/memory/2888-59-0x0000000000250000-0x0000000000393000-memory.dmp upx behavioral1/memory/2776-61-0x0000000000250000-0x0000000000393000-memory.dmp upx behavioral1/memory/2888-46-0x0000000000250000-0x0000000000393000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Udi.exe.comUdi.exe.comRegAsm.exefindstr.exeForma.exe.comQdUPABU.exe4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exePING.EXEcmd.exemakecab.exeOQTGVRp.exemakecab.execmd.exefindstr.exePING.EXERegAsm.execmd.execmd.exeForma.exe.comdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Udi.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Udi.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Forma.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QdUPABU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language makecab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OQTGVRp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language makecab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Forma.exe.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEPING.EXEpid Process 3064 PING.EXE 2820 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
Forma.exe.comForma.exe.comUdi.exe.comUdi.exe.compid Process 2800 Forma.exe.com 2800 Forma.exe.com 2800 Forma.exe.com 780 Forma.exe.com 780 Forma.exe.com 780 Forma.exe.com 1164 Udi.exe.com 1164 Udi.exe.com 1164 Udi.exe.com 1516 Udi.exe.com 1516 Udi.exe.com 1516 Udi.exe.com -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
Forma.exe.comForma.exe.comUdi.exe.comUdi.exe.compid Process 2800 Forma.exe.com 2800 Forma.exe.com 2800 Forma.exe.com 780 Forma.exe.com 780 Forma.exe.com 780 Forma.exe.com 1164 Udi.exe.com 1164 Udi.exe.com 1164 Udi.exe.com 1516 Udi.exe.com 1516 Udi.exe.com 1516 Udi.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exeOQTGVRp.execmd.execmd.exeQdUPABU.exeForma.exe.comcmd.execmd.exedescription pid Process procid_target PID 3020 wrote to memory of 2300 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 30 PID 3020 wrote to memory of 2300 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 30 PID 3020 wrote to memory of 2300 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 30 PID 3020 wrote to memory of 2300 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 30 PID 3020 wrote to memory of 2888 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 31 PID 3020 wrote to memory of 2888 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 31 PID 3020 wrote to memory of 2888 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 31 PID 3020 wrote to memory of 2888 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 31 PID 3020 wrote to memory of 2748 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 32 PID 3020 wrote to memory of 2748 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 32 PID 3020 wrote to memory of 2748 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 32 PID 3020 wrote to memory of 2748 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 32 PID 3020 wrote to memory of 2776 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 33 PID 3020 wrote to memory of 2776 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 33 PID 3020 wrote to memory of 2776 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 33 PID 3020 wrote to memory of 2776 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 33 PID 3020 wrote to memory of 2864 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 34 PID 3020 wrote to memory of 2864 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 34 PID 3020 wrote to memory of 2864 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 34 PID 3020 wrote to memory of 2864 3020 4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe 34 PID 2748 wrote to memory of 2736 2748 OQTGVRp.exe 35 PID 2748 wrote to memory of 2736 2748 OQTGVRp.exe 35 PID 2748 wrote to memory of 2736 2748 OQTGVRp.exe 35 PID 2748 wrote to memory of 2736 2748 OQTGVRp.exe 35 PID 2748 wrote to memory of 2568 2748 OQTGVRp.exe 37 PID 2748 wrote to memory of 2568 2748 OQTGVRp.exe 37 PID 2748 wrote to memory of 2568 2748 OQTGVRp.exe 37 PID 2748 wrote to memory of 2568 2748 OQTGVRp.exe 37 PID 2568 wrote to memory of 2612 2568 cmd.exe 39 PID 2568 wrote to memory of 2612 2568 cmd.exe 39 PID 2568 wrote to memory of 2612 2568 cmd.exe 39 PID 2568 wrote to memory of 2612 2568 cmd.exe 39 PID 2612 wrote to memory of 2644 2612 cmd.exe 40 PID 2612 wrote to memory of 2644 2612 cmd.exe 40 PID 2612 wrote to memory of 2644 2612 cmd.exe 40 PID 2612 wrote to memory of 2644 2612 cmd.exe 40 PID 2612 wrote to memory of 2800 2612 cmd.exe 41 PID 2612 wrote to memory of 2800 2612 cmd.exe 41 PID 2612 wrote to memory of 2800 2612 cmd.exe 41 PID 2612 wrote to memory of 2800 2612 cmd.exe 41 PID 2612 wrote to memory of 3064 2612 cmd.exe 42 PID 2612 wrote to memory of 3064 2612 cmd.exe 42 PID 2612 wrote to memory of 3064 2612 cmd.exe 42 PID 2612 wrote to memory of 3064 2612 cmd.exe 42 PID 2864 wrote to memory of 2840 2864 QdUPABU.exe 43 PID 2864 wrote to memory of 2840 2864 QdUPABU.exe 43 PID 2864 wrote to memory of 2840 2864 QdUPABU.exe 43 PID 2864 wrote to memory of 2840 2864 QdUPABU.exe 43 PID 2864 wrote to memory of 1760 2864 QdUPABU.exe 45 PID 2864 wrote to memory of 1760 2864 QdUPABU.exe 45 PID 2864 wrote to memory of 1760 2864 QdUPABU.exe 45 PID 2864 wrote to memory of 1760 2864 QdUPABU.exe 45 PID 2800 wrote to memory of 780 2800 Forma.exe.com 47 PID 2800 wrote to memory of 780 2800 Forma.exe.com 47 PID 2800 wrote to memory of 780 2800 Forma.exe.com 47 PID 2800 wrote to memory of 780 2800 Forma.exe.com 47 PID 1760 wrote to memory of 1036 1760 cmd.exe 48 PID 1760 wrote to memory of 1036 1760 cmd.exe 48 PID 1760 wrote to memory of 1036 1760 cmd.exe 48 PID 1760 wrote to memory of 1036 1760 cmd.exe 48 PID 1036 wrote to memory of 2628 1036 cmd.exe 49 PID 1036 wrote to memory of 2628 1036 cmd.exe 49 PID 1036 wrote to memory of 2628 1036 cmd.exe 49 PID 1036 wrote to memory of 2628 1036 cmd.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe"C:\Users\Admin\AppData\Local\Temp\4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\MarsBuild_2021-11-14_11-20.exe"C:\Users\Admin\AppData\Local\Temp\MarsBuild_2021-11-14_11-20.exe"2⤵
- Executes dropped EXE
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\clean.exe"C:\Users\Admin\AppData\Local\Temp\clean.exe"2⤵
- Executes dropped EXE
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe"C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\makecab.exemakecab3⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Duro.potx3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^JdynOpYGXnWkzSuDQWhFskbJYxaqZbxLWAnCRclynOJXkaaxpyDmJmtnSvAxQXHArlfSxDLxLiiDBmnGwYRUUVevcZJcVQgAupUqemqFzoNBaA$" Due.potx5⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.comForma.exe.com b5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com b6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1488
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3064
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\clean.exe"C:\Users\Admin\AppData\Local\Temp\clean.exe"2⤵
- Executes dropped EXE
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe"C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\makecab.exemakecab3⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Aggrava.accdt3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^ShpzYFLbYRfWJuFRXyNbzLysSxWtdBORrgKocLRwRlexRlxdHPIcxtdioSAEIHivrnSxvvvjgLGoIKmHZGvBSzvYYDqDljzlrGszaqTlaviIninbaTFelFEKwTcTvTew$" Pie.accdt5⤵
- System Location Discovery: System Language Discovery
PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.comUdi.exe.com k5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.comC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com k6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2820
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD56684f94034e10a93758e2c22c75f1613
SHA125b7d85449caa642beafcf488f1af1fb745ad0ca
SHA2563e6fff185ac509106bed8e02969acc2c272f65300249e66b5a504c92d4a58d0e
SHA51243141e2a5f1cd92cff9a63e1af68d9a1af458ae8f5f7b489172d06e21fe103793a045ed4ee613b4618b42665c5d644d058c0ac78d19d0ef55cf5936201cfd1fb
-
Filesize
334B
MD532672958dfe282494f18f8be6b5daea8
SHA129eb8689b235ffc001286410039ff1399b9e3d33
SHA256a9a4218d1a194894aaf6b487c502a24f0f84041a20e720a4a719201ffc31ae02
SHA51205a7c2ee83b6284df5f072ba493a0b90e315e54c786ee22b159e3d1197335c72f8b637ddf2e1c7884c4275e0ebc553d68492ae2ed42b43d11c0010808e5dc5f4
-
Filesize
931KB
MD5016c737a43c6e6e2cb7abf7d85c5057d
SHA1e68f088fa89473aa3cc032429bcc62b4b0f61116
SHA256b1263474b5adfaa1419a51ebd697ddcb05ff89bc6c037e08d376994f4550957b
SHA512ebba96e749127d7678bae1d47cd00a287812a49840da72932f97e8469e49a3eb01b0c198aa69ae42c03211cfed275c77fdf086679433dc8c55ea60b1ccf3c607
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
343B
MD5ea7b73c99c39a859e7e8b0a815570986
SHA1bd74eb1f49d26a461060f131683021750889a65f
SHA256edd2efdd14116825ff18d706aad2bd716382acbe678eda85c5057bd257b1a02e
SHA512167288428c40eab8e1864bf7db8e70721790763bed0db598af1da860950839058255f58398a61070fbafeea575d9557ec7c6d5b9c424b217602968a40cdf34d9
-
Filesize
909KB
MD5d9119aa074bfaff410bb7a4139146a19
SHA174ea5a967fcba2dde0b27de519dbaf1ef7028636
SHA256797bdb0508bf241ccc4beff1da822e26b5113592556fbbf53623ec2f0c432ec7
SHA5121187f6c0f0f9488bfd57129622b24e747b54a50cb1141bc7fc9e1d62e9a80c415efa85c7322d3391a88fb9e9b8335daabf0e258d3896f2eba571e9e7fbba32b6
-
Filesize
872KB
MD5a172c86dab6bebb6c82410c1f1c1567d
SHA156a171dfe8137793f45640fc31b3a159f5a84c7d
SHA256d83dd02bf0531d87e4b1af3a68cd601b21d33e2a9e77bc7e8cf1753f77b10438
SHA512107df456743e3e793ca75e2c5e7bfad1ee1801cae03636dec2539cd4c4995b601c3d79118ad0874c6caf8293d1812bf31d459549f7925cb814e30bad4fc30896
-
Filesize
263KB
MD53d58b1c286a8d5deb900c56210d19611
SHA1f3a8e5a0fabe01268c9c99e981208e36d210900b
SHA25619c5b1b8a2cdb858835234cebf962a73492f843b6e434b7e5c11d16ddcf09a62
SHA5123ed1ed8756d3aee5cc271b4850905dd02e6f1e5b8ba0bb3df004636af5fcb49380ae594774bb0984f8de485e6bfa1307d981aedd7a65bb558598e971fdce1530
-
Filesize
819KB
MD5ae5b62f74b751690528b1158da869f4b
SHA19ba07ae06ba49b16fa32dfdd51df33ae771597f4
SHA2569300234fb143a410b3fc3fa0e0631a6a15f563a086af6854d0917ae5653ff0f5
SHA512ba5fd421118e296b9678cbabc19419db1645dbf4c403e5d20cc29a6a2e6e41b71a18e4779004dd79c2f8ede2f13ca9d7ebd5717954cb92bc990d338b77a6e3a2
-
Filesize
309KB
MD5374a47aa60ba4ef1c2306be2949f0849
SHA1612fedf2475d75d3805d9801f00de1111591b7cc
SHA256c1570c01feaf033c8d7697a7a873b77754b22aa67e0ca0499ed22095b651d2af
SHA512ecb64e77cbca48ae129c08c93565c937a336c7f0016d19a12b76aee8e2508f21615ee1c104123ed5b5dc5e0e077bc81ac8c7042285e778b855a009b6087fad9d
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
Filesize
808KB
MD56a537efb426fe0de4d613615a82fa729
SHA1ed5acfd81d01a5804df26cb259793e532992f07a
SHA2560f20bd03381fabc111c319d58c04e5c8c4fdf4a12fbfed2ae5b0d13b8964ff7b
SHA512bbdc5c3ffd04bc2e35b6cb476dd05315db9d6673edea1b7beafbf70544d4f4a54652213c149362dd8392fddb47d341ee9b17e109d0f8fd8286fceca7abf17ba5