Analysis
-
max time kernel
2699s -
max time network
2600s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-12-2024 19:34
Static task
static1
General
-
Target
Download-RedLine-Stealer-Latest-Cleaned-main/RedLine Stealer.zip
-
Size
17.2MB
-
MD5
d3d1d5504a838b38d27bfdc29a9bf0ea
-
SHA1
f6c351251c4b5fa64b852dc2ae6f85cf870a1508
-
SHA256
4f90b7c87ae9a261936b72f8062c7ffff38f5921dc58794a23084aa0ad95969d
-
SHA512
7f7dd2471f6aec68b1a2d59b1ccac1cef1142ee9fd734db6b320013dddac3c8e828ec0339765aa4df864e275415862df877971dbec803a3d6b350f034982c781
-
SSDEEP
393216:y6AL1DWiFjy2F43KVjCybo8x8CLO0kjl2sDYSUs9Tx:y5L1rFjEKl1oNrJZYyl
Malware Config
Extracted
xworm
5.0
svchost.serveirc.com:1313
MML7YiawHlQLefrX
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7089308942:AAHsTcsMKoz1p6-9kX7OD8cZDlRLQM_DN-A/sendMessage?chat_id=5936200928
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x001900000002ab0c-82.dat family_xworm behavioral1/memory/4616-90-0x0000000000030000-0x000000000004A000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/5104-3958-0x000000001FDF0000-0x000000001FE0A000-memory.dmp family_redline -
Redline family
-
Xworm family
-
Executes dropped EXE 64 IoCs
pid Process 4104 Panel.exe 2028 Panel.exe 4616 svchost.exe 5104 Panel.exe 4216 svchost.exe 4148 Krumo.Loader.exe 2192 Rarqxqlarwy.exe 5044 Eihb.exe 2472 Kurome.Host.exe 5048 Krumo.Loader.exe 5084 svchost.exe 2024 Rarqxqlarwy.exe 2744 Eihb.exe 1068 Kurome.Host.exe 492 Panel.exe 4044 Panel.exe 5108 svchost.exe 3768 Panel.exe 576 Panel.exe 5080 Panel.exe 2712 svchost.exe 6016 Panel.exe 5736 Panel.exe 5508 svchost.exe 2600 Panel.exe 1672 svchost.exe 1668 svchost.exe 3868 svchost.exe 3824 svchost.exe 4836 svchost.exe 4900 svchost.exe 1756 svchost.exe 4184 svchost.exe 5124 svchost.exe 5516 svchost.exe 4752 svchost.exe 2480 svchost.exe 3064 svchost.exe 3248 svchost.exe 4020 svchost.exe 5096 svchost.exe 3232 svchost.exe 5056 svchost.exe 2584 svchost.exe 4936 svchost.exe 5576 svchost.exe 1504 svchost.exe 5516 svchost.exe 5956 svchost.exe 4100 svchost.exe 2716 svchost.exe 1808 svchost.exe 1572 svchost.exe 3676 svchost.exe 1596 svchost.exe 3652 svchost.exe 1428 svchost.exe 1216 svchost.exe 5460 svchost.exe 840 svchost.exe 1496 svchost.exe 5656 svchost.exe 5928 svchost.exe 5212 svchost.exe -
Loads dropped DLL 20 IoCs
pid Process 2472 Kurome.Host.exe 2472 Kurome.Host.exe 2472 Kurome.Host.exe 2472 Kurome.Host.exe 2472 Kurome.Host.exe 2472 Kurome.Host.exe 2744 Eihb.exe 2744 Eihb.exe 2744 Eihb.exe 2744 Eihb.exe 2024 Rarqxqlarwy.exe 2024 Rarqxqlarwy.exe 2024 Rarqxqlarwy.exe 2024 Rarqxqlarwy.exe 1068 Kurome.Host.exe 1068 Kurome.Host.exe 1068 Kurome.Host.exe 1068 Kurome.Host.exe 1068 Kurome.Host.exe 1068 Kurome.Host.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 4044 Panel.exe 4044 Panel.exe 4044 Panel.exe 4044 Panel.exe 4044 Panel.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll Rarqxqlarwy.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll Rarqxqlarwy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4936 5044 WerFault.exe 92 4928 2744 WerFault.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eihb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rarqxqlarwy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kurome.Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eihb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rarqxqlarwy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kurome.Host.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 = 500031000000000047597663100041646d696e003c0009000400efbe4759495e8459609c2e00000029570200000001000000000000000000000000000000928a0300410064006d0069006e00000014000000 Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7 Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0 = 50003100000000008459c99c10004c6f63616c003c0009000400efbe4759495e8459e49c2e00000048570200000001000000000000000000000000000000ab244b004c006f00630061006c00000014000000 Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0\MRUListEx = 00000000ffffffff Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0\0\NodeSlot = "6" Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" Panel.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0\0\MRUListEx = ffffffff Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 = 78003100000000004759495e1100557365727300640009000400efbec5522d608459609c2e0000006c0500000000010000000000000000003a0000000000f644520055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\MRUListEx = 00000000ffffffff Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Panel.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 3a002e8005398e082303024b98265d99428e115f260001002600efbe110000000a343014af18db0119becf92b318db0119becf92b318db0114000000 Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0 Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\MRUListEx = 00000000ffffffff Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = ffffffff Panel.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\SniffedFolderType = "Downloads" Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0 Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\MRUListEx = 00000000ffffffff Panel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Panel.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0\0 = 4e003100000000008459c99c100054656d7000003a0009000400efbe4759495e8459c99c2e00000049570200000001000000000000000000000000000000cb59a300540065006d007000000014000000 Panel.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg Panel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\NodeSlot = "7" Panel.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 19002f433a5c000000000000000000000000000000000000000000 Panel.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1880 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 2028 Panel.exe 5104 Panel.exe 5104 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe 2028 Panel.exe 5104 Panel.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3496 7zFM.exe Token: 35 3496 7zFM.exe Token: SeSecurityPrivilege 3496 7zFM.exe Token: SeDebugPrivilege 4616 svchost.exe Token: SeDebugPrivilege 2028 Panel.exe Token: SeDebugPrivilege 4616 svchost.exe Token: SeDebugPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: SeDebugPrivilege 4216 svchost.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe Token: 33 5104 Panel.exe Token: SeIncBasePriorityPrivilege 5104 Panel.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3496 7zFM.exe 3496 7zFM.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2028 Panel.exe 5104 Panel.exe 4044 Panel.exe 3768 Panel.exe 5080 Panel.exe 6016 Panel.exe 5736 Panel.exe 2600 Panel.exe 2600 Panel.exe 2600 Panel.exe 2600 Panel.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4104 wrote to memory of 2028 4104 Panel.exe 83 PID 4104 wrote to memory of 2028 4104 Panel.exe 83 PID 4104 wrote to memory of 4616 4104 Panel.exe 84 PID 4104 wrote to memory of 4616 4104 Panel.exe 84 PID 4616 wrote to memory of 1880 4616 svchost.exe 85 PID 4616 wrote to memory of 1880 4616 svchost.exe 85 PID 2028 wrote to memory of 5104 2028 Panel.exe 87 PID 2028 wrote to memory of 5104 2028 Panel.exe 87 PID 4148 wrote to memory of 2192 4148 Krumo.Loader.exe 91 PID 4148 wrote to memory of 2192 4148 Krumo.Loader.exe 91 PID 4148 wrote to memory of 2192 4148 Krumo.Loader.exe 91 PID 4148 wrote to memory of 5044 4148 Krumo.Loader.exe 92 PID 4148 wrote to memory of 5044 4148 Krumo.Loader.exe 92 PID 4148 wrote to memory of 5044 4148 Krumo.Loader.exe 92 PID 5048 wrote to memory of 2024 5048 Krumo.Loader.exe 101 PID 5048 wrote to memory of 2024 5048 Krumo.Loader.exe 101 PID 5048 wrote to memory of 2024 5048 Krumo.Loader.exe 101 PID 5048 wrote to memory of 2744 5048 Krumo.Loader.exe 103 PID 5048 wrote to memory of 2744 5048 Krumo.Loader.exe 103 PID 5048 wrote to memory of 2744 5048 Krumo.Loader.exe 103 PID 492 wrote to memory of 4044 492 Panel.exe 109 PID 492 wrote to memory of 4044 492 Panel.exe 109 PID 492 wrote to memory of 5108 492 Panel.exe 110 PID 492 wrote to memory of 5108 492 Panel.exe 110 PID 4044 wrote to memory of 3768 4044 Panel.exe 111 PID 4044 wrote to memory of 3768 4044 Panel.exe 111 PID 576 wrote to memory of 5080 576 Panel.exe 113 PID 576 wrote to memory of 5080 576 Panel.exe 113 PID 576 wrote to memory of 2712 576 Panel.exe 114 PID 576 wrote to memory of 2712 576 Panel.exe 114 PID 5080 wrote to memory of 6016 5080 Panel.exe 115 PID 5080 wrote to memory of 6016 5080 Panel.exe 115 PID 3768 wrote to memory of 5736 3768 Panel.exe 116 PID 3768 wrote to memory of 5736 3768 Panel.exe 116 PID 5736 wrote to memory of 2600 5736 Panel.exe 118 PID 5736 wrote to memory of 2600 5736 Panel.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Download-RedLine-Stealer-Latest-Cleaned-main\RedLine Stealer.zip"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3496
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2216
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RedLine Stealer\How To Use.txt1⤵PID:960
-
C:\Users\Admin\Desktop\RedLine Stealer\Panel\Panel\Panel.exe"C:\Users\Admin\Desktop\RedLine Stealer\Panel\Panel\Panel.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\Panel.exe"C:\Users\Admin\AppData\Local\Temp\Panel.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\Panel.exe"C:\Users\Admin\AppData\Local\Temp\Panel.exe" "--monitor"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5104
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1880
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
C:\Users\Admin\Desktop\RedLine Stealer\Kurome.Loader\Krumo.Loader.exe"C:\Users\Admin\Desktop\RedLine Stealer\Kurome.Loader\Krumo.Loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\Rarqxqlarwy.exe"C:\Users\Admin\AppData\Local\Temp\Rarqxqlarwy.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\Eihb.exe"C:\Users\Admin\AppData\Local\Temp\Eihb.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 17603⤵
- Program crash
PID:4936
-
-
-
C:\Users\Admin\Desktop\RedLine Stealer\Kurome.Host\Kurome.Host.exe"C:\Users\Admin\Desktop\RedLine Stealer\Kurome.Host\Kurome.Host.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5044 -ip 50441⤵PID:4156
-
C:\Users\Admin\Desktop\RedLine Stealer\Kurome.Loader\Krumo.Loader.exe"C:\Users\Admin\Desktop\RedLine Stealer\Kurome.Loader\Krumo.Loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Rarqxqlarwy.exe"C:\Users\Admin\AppData\Local\Temp\Rarqxqlarwy.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\Eihb.exe"C:\Users\Admin\AppData\Local\Temp\Eihb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 17523⤵
- Program crash
PID:4928
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:5084
-
C:\Users\Admin\Desktop\RedLine Stealer\Kurome.Host\Kurome.Host.exe"C:\Users\Admin\Desktop\RedLine Stealer\Kurome.Host\Kurome.Host.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2744 -ip 27441⤵PID:4628
-
C:\Users\Admin\Desktop\RedLine Stealer\Panel\Panel\Panel.exe"C:\Users\Admin\Desktop\RedLine Stealer\Panel\Panel\Panel.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Local\Temp\Panel.exe"C:\Users\Admin\AppData\Local\Temp\Panel.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\Panel.exe"C:\Users\Admin\AppData\Local\Temp\Panel.exe" "--monitor"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\Panel.exe"C:\Users\Admin\AppData\Local\Temp\Panel.exe" "auth" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAzXBYs4SYNUa0R/9OpRl7qgAAAAACAAAAAAAQZgAAAAEAACAAAACxYeZHxbsIzEwXN8Au1nol/MYbCYN6kZtA7LZZD/qe4QAAAAAOgAAAAAIAACAAAAAXj1Ws8l7ZVtDmnAlvQz3RYXoGDpP5jC7NP3/C1q47TRAAAADmjGNO3jkVaUwfGSbjxEWGQAAAALCWtwfE3CIAJe4Ms2obZrSaOKKb85v2aykAi021da642rzwHlSLwPWEE1w9XKee/qiBTModG/+/fVSOTnpbhOc=" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAzXBYs4SYNUa0R/9OpRl7qgAAAAACAAAAAAAQZgAAAAEAACAAAAB/H+kD0rvrrwdKw7eEkkxLYN5QvQ6aC1puuE5P64Kv1gAAAAAOgAAAAAIAACAAAAAkMeYJURcmMGb3PC25itquXY+nHJgRv6aMVoIhpqxNpBAAAAAdnKYsyuZdJHChWKmyQheGQAAAAK1MiucE2L61OJoO2ETK+xRCA7UJAjHca1BVnAiPBgMo3+f8GfUBvsyrAHTo31nrkqlAqiSFssae41XDXRlG0F8="4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5736 -
C:\Users\Admin\AppData\Local\Temp\Panel.exe"C:\Users\Admin\AppData\Local\Temp\Panel.exe" "auth" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAzXBYs4SYNUa0R/9OpRl7qgAAAAACAAAAAAAQZgAAAAEAACAAAACxYeZHxbsIzEwXN8Au1nol/MYbCYN6kZtA7LZZD/qe4QAAAAAOgAAAAAIAACAAAAAXj1Ws8l7ZVtDmnAlvQz3RYXoGDpP5jC7NP3/C1q47TRAAAADmjGNO3jkVaUwfGSbjxEWGQAAAALCWtwfE3CIAJe4Ms2obZrSaOKKb85v2aykAi021da642rzwHlSLwPWEE1w9XKee/qiBTModG/+/fVSOTnpbhOc=" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAzXBYs4SYNUa0R/9OpRl7qgAAAAACAAAAAAAQZgAAAAEAACAAAAB/H+kD0rvrrwdKw7eEkkxLYN5QvQ6aC1puuE5P64Kv1gAAAAAOgAAAAAIAACAAAAAkMeYJURcmMGb3PC25itquXY+nHJgRv6aMVoIhpqxNpBAAAAAdnKYsyuZdJHChWKmyQheGQAAAAK1MiucE2L61OJoO2ETK+xRCA7UJAjHca1BVnAiPBgMo3+f8GfUBvsyrAHTo31nrkqlAqiSFssae41XDXRlG0F8=" "--monitor"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
PID:5108
-
-
C:\Users\Admin\Desktop\RedLine Stealer\Panel\Panel\Panel.exe"C:\Users\Admin\Desktop\RedLine Stealer\Panel\Panel\Panel.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\Panel.exe"C:\Users\Admin\AppData\Local\Temp\Panel.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\Panel.exe"C:\Users\Admin\AppData\Local\Temp\Panel.exe" "--monitor"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6016
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
PID:2712
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:5508
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:1672
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:1668
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:3868
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:3824
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:4836
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:4900
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:1756
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:4184
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:5124
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:5516
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:4752
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:2480
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:3064
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:3248
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:4020
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:5096
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:3232
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:5056
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:2584
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:4936
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:5576
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:1504
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:5516
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:5956
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:4100
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:2716
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:1808
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:1572
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:3676
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:1596
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:3652
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:1428
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:1216
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:5460
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:840
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:1496
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:5656
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:5928
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
PID:5212
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:5600
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b4e91d2e5f40d5e2586a86cf3bb4df24
SHA131920b3a41aa4400d4a0230a7622848789b38672
SHA2565d8af3c7519874ed42a0d74ee559ae30d9cc6930aef213079347e2b47092c210
SHA512968751b79a98961f145de48d425ea820fd1875bae79a725adf35fc8f4706c103ee0c7babd4838166d8a0dda9fbce3728c0265a04c4b37f335ec4eaa110a2b319
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
1KB
MD51fac34169b9261b51fcb7b3c4434faeb
SHA107b94eb9ff0ecf49e1dba237328790cb883477b4
SHA256c76a7825ba90a2a6745337b5b8ae329e61d4be50224681b98762d286142a7bdc
SHA51270288a4a4f3d55a0375471efdc808309d641ceb3ef28a162db2fa1d9f0999c3855de499a131adb3529eb6fb9445f58d085b21619f08dad79596e95036fce423a
-
Filesize
425B
MD5bb27934be8860266d478c13f2d65f45e
SHA1a69a0e171864dcac9ade1b04fc0313e6b4024ccb
SHA25685ad0d9909461517acf2e24ff116ca350e9b7000b4eefb23aa3647423c9745b4
SHA51287dd77feac509a25b30c76c119752cc25020cca9c53276c2082aef2a8c75670ef67e1e70024a63d44ae442b64f4bc464aee6691e80c525376bb7421929cfa3bb
-
Filesize
118KB
MD5677073949945ca09fe971682561c5f11
SHA1cb33238550faa82cb5d3b5e4116a8c721a4fc96c
SHA256571d22f4659932c89344baf33e0e53dcb790fa9cb196ad7a937ce17f567f5062
SHA512006c596edb2c6cef589319917c70531e0672cd8831a4d6852c0641e9cc9a90d351f687884da67a02055706c334e94b68a17c8a0cf9f6041b633f8f85cd9185f6
-
Filesize
9.3MB
MD5f4e19b67ef27af1434151a512860574e
SHA156304fc2729974124341e697f3b21c84a8dd242a
SHA256c7a8709013ada38fc2e1ceb3b15631f2aea8e156eb3f0aa197e02df1259a493a
SHA512a92e73d58c51bb74618987f06166f52a65ed1525410aec1b8e377ea8547c1123e313e13e305310f7a750c4561756d87ff558670bf4df8b62ea874d6f7c14ca77
-
Filesize
2.2MB
MD5a3ec05d5872f45528bbd05aeecf0a4ba
SHA168486279c63457b0579d86cd44dd65279f22d36f
SHA256d4797b2e4957c9041ba32454657f5d9a457851c6b5845a57e0e5397707e7773e
SHA512b96b582bb26cb40dbb2a0709a6c88acd87242d0607d548473e3023ffa0a6c9348922a98a4948f105ea0b8224a3930af1e698c6cee3c36ca6a83df6d20c868e8e
-
Filesize
80KB
MD584bec3b8c6db81ad3f26c2796b02a2b5
SHA17b3e8f34510e196754eb6a21812d96976a24c351
SHA256263251f3218d9e250a8a741ecfa1c5182030d75b75dac3314bdde8c050b2e301
SHA5125690eb7c9dde782ef635edbcf1beab61166bcc651f00334ae1b3554af56b5455c5486c5dc0a70cb7e5bb72bc9742ec77be450ff0f4d5fcdd984e52f9db87aed4
-
Filesize
725B
MD5b7de1d805c991602041a05dbcf222f24
SHA1f1e1516b3f0a17f670abd475b2e51ccd82591a30
SHA256d5964507a22c93f848a86b3eb4c9f39f658bfa6971474f1e60fc0c734501f9a7
SHA512d6b42edbe026c0b3b6938fe8bc93828913ba476db86c842fd4869edc50376aacaaf42e84314bda9c0347db16cd19d431a660a14416a4f15d3cf8b9a40e35faf8
-
Filesize
119KB
MD54fde0f80c408af27a8d3ddeffea12251
SHA1e834291127af150ce287443c5ea607a7ae337484
SHA2561b644cdb1c7247c07d810c0ea10bec34dc5600f3645589690a219de08cf2dedb
SHA5123693aeaa2cc276060b899f21f6f57f435b75fec5bcd7725b2dd79043b341c12ebc29bd43b287eb22a3e31fd2b50c4fa36bf020f9f3db5e2f75fe8cc747eca5f5
-
Filesize
189B
MD55a7f52d69e6fca128023469ae760c6d5
SHA19d7f75734a533615042f510934402c035ac492f7
SHA256498c7f8e872f9cef0cf04f7d290cf3804c82a007202c9b484128c94d03040fd0
SHA5124dc8ae80ae9e61d2801441b6928a85dcf9d6d73656d064ffbc0ce9ee3ad531bfb140e9f802e39da2a83af6de606b115e5ccd3da35d9078b413b1d1846cbd1b4f
-
Filesize
123KB
MD5e3d39e30e0cdb76a939905da91fe72c8
SHA1433fc7dc929380625c8a6077d3a697e22db8ed14
SHA2564bfa493b75361920e6403c3d85d91a454c16ddda89a97c425257e92b352edd74
SHA5129bb3477023193496ad20b7d11357e510ba3d02b036d6f35f57d061b1fc4d0f6cb3055ae040d78232c8a732d9241699ddcfac83cc377230109bf193736d9f92b8
-
Filesize
2.2MB
MD5eac11bc16c0fda030e431a794119473f
SHA17ccff2bbb88f35e6cee7c58ec264abee962aa556
SHA2568fb55b92f639950c9bbc3c3920a5780ca2d58100e03388d4568dfb48b006372e
SHA51272ae606ca6267cd1ee9dc4f339367d969dd5ee419d91faa757023cb3d3104f0d2eb55ba83208a308bdc5cfcd6d75b7c3fc9966a87d2e77d2f3ab3f87bfb28d25
-
Filesize
9.4MB
MD531fa09a4239fb382ab8be3c30fb35f2f
SHA1c31a3400a47a9c47e051b5f7d2f8f9e6346a121b
SHA256ebf94a98b7f5016ddfb9c7b13a689f0c71e8b6b65c495fbd093cc874e3bb86e4
SHA51236fd6ea03ff46b490d901bcca543d85c74fe3a02145f65b07eb2a1c4c491c48aa80e90ba98f5a5ee0a0f3c9933f27c72d42d7f71f2095b2ef74dc9e9c7ed8fe5
-
Filesize
26KB
MD5494890d393a5a8c54771186a87b0265e
SHA1162fa5909c1c3f84d34bda5d3370a957fe58c9c8
SHA256f2a5a06359713226aeacfe239eeb8ae8606f4588d8e58a19947c3a190efbdfc7
SHA51240fbd033f288fee074fc36e899796efb30d3c582784b834fc583706f19a0b8d5a134c6d1405afe563d2676072e4eefc4e169b2087867cab77a3fa1aa1a7c9395
-
Filesize
3.4MB
MD5059d51f43f1a774bc5aa76d19c614670
SHA1171329bf0f48190cf4d59ce106b139e63507457d
SHA2562eaf3d548927ebd243362f7bcb906bb1bbff3961223fb9521cb2846b6b8d523d
SHA512a299cb18c8a47fc27c46db0011266b7fa273852b302374eb98a54034e1281150af8e54e58f76a384d3b92fbcb1a67fc0452cabe592a379e15cce2c5f9a4b6cb7