Analysis
-
max time kernel
149s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2023 20:15
Static task
static1
General
-
Target
a9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c.exe
-
Size
785KB
-
MD5
c27e8d9d73e1b45fe6c14c3cb813a536
-
SHA1
0f35e67f3c914b1ec8059a382498585be2e7b21e
-
SHA256
a9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c
-
SHA512
6ad88b2f23a5b8c10bcb67c8bea4bff78e3b4d3e5eb14f172c4273336ced5dde871ab9bf7b53da58e44de415cafd5ec6d803c53c1720cd7e754e5d28aa81f194
-
SSDEEP
24576:ZyTaYa/E4cQ+MCbEykj9yZGRGSAKp9wC:MTaY+EVb9k8GE09w
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
it815948.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it815948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it815948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it815948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it815948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it815948.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it815948.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/5092-165-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-168-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-170-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-166-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-172-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-176-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-174-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-178-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-180-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-182-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-184-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-186-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-188-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-190-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-192-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-194-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-196-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-198-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-200-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-202-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-204-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-206-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-208-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-210-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-212-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-214-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-216-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-218-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-220-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-222-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-224-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-226-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/5092-228-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lr190317.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation lr190317.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
zixh1023.exeziQQ9970.exeit815948.exejr674112.exekp698465.exelr190317.exeoneetx.exeoneetx.exeoneetx.exepid process 1156 zixh1023.exe 2456 ziQQ9970.exe 4948 it815948.exe 5092 jr674112.exe 4384 kp698465.exe 1364 lr190317.exe 3524 oneetx.exe 2616 oneetx.exe 2780 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 392 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it815948.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it815948.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
zixh1023.exeziQQ9970.exea9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zixh1023.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziQQ9970.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziQQ9970.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zixh1023.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4596 5092 WerFault.exe jr674112.exe 2776 1364 WerFault.exe lr190317.exe 1564 1364 WerFault.exe lr190317.exe 4396 1364 WerFault.exe lr190317.exe 1776 1364 WerFault.exe lr190317.exe 2784 1364 WerFault.exe lr190317.exe 4848 1364 WerFault.exe lr190317.exe 3892 1364 WerFault.exe lr190317.exe 4952 1364 WerFault.exe lr190317.exe 1932 1364 WerFault.exe lr190317.exe 4948 1364 WerFault.exe lr190317.exe 4896 3524 WerFault.exe oneetx.exe 4160 3524 WerFault.exe oneetx.exe 264 3524 WerFault.exe oneetx.exe 3848 3524 WerFault.exe oneetx.exe 1472 3524 WerFault.exe oneetx.exe 1512 3524 WerFault.exe oneetx.exe 4900 3524 WerFault.exe oneetx.exe 1652 3524 WerFault.exe oneetx.exe 3472 3524 WerFault.exe oneetx.exe 1936 3524 WerFault.exe oneetx.exe 5092 3524 WerFault.exe oneetx.exe 2416 3524 WerFault.exe oneetx.exe 2692 3524 WerFault.exe oneetx.exe 4360 2616 WerFault.exe oneetx.exe 1824 3524 WerFault.exe oneetx.exe 3628 3524 WerFault.exe oneetx.exe 3500 3524 WerFault.exe oneetx.exe 4956 2780 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it815948.exejr674112.exekp698465.exepid process 4948 it815948.exe 4948 it815948.exe 5092 jr674112.exe 5092 jr674112.exe 4384 kp698465.exe 4384 kp698465.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it815948.exejr674112.exekp698465.exedescription pid process Token: SeDebugPrivilege 4948 it815948.exe Token: SeDebugPrivilege 5092 jr674112.exe Token: SeDebugPrivilege 4384 kp698465.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr190317.exepid process 1364 lr190317.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
a9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c.exezixh1023.exeziQQ9970.exelr190317.exeoneetx.exedescription pid process target process PID 3744 wrote to memory of 1156 3744 a9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c.exe zixh1023.exe PID 3744 wrote to memory of 1156 3744 a9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c.exe zixh1023.exe PID 3744 wrote to memory of 1156 3744 a9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c.exe zixh1023.exe PID 1156 wrote to memory of 2456 1156 zixh1023.exe ziQQ9970.exe PID 1156 wrote to memory of 2456 1156 zixh1023.exe ziQQ9970.exe PID 1156 wrote to memory of 2456 1156 zixh1023.exe ziQQ9970.exe PID 2456 wrote to memory of 4948 2456 ziQQ9970.exe it815948.exe PID 2456 wrote to memory of 4948 2456 ziQQ9970.exe it815948.exe PID 2456 wrote to memory of 5092 2456 ziQQ9970.exe jr674112.exe PID 2456 wrote to memory of 5092 2456 ziQQ9970.exe jr674112.exe PID 2456 wrote to memory of 5092 2456 ziQQ9970.exe jr674112.exe PID 1156 wrote to memory of 4384 1156 zixh1023.exe kp698465.exe PID 1156 wrote to memory of 4384 1156 zixh1023.exe kp698465.exe PID 1156 wrote to memory of 4384 1156 zixh1023.exe kp698465.exe PID 3744 wrote to memory of 1364 3744 a9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c.exe lr190317.exe PID 3744 wrote to memory of 1364 3744 a9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c.exe lr190317.exe PID 3744 wrote to memory of 1364 3744 a9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c.exe lr190317.exe PID 1364 wrote to memory of 3524 1364 lr190317.exe oneetx.exe PID 1364 wrote to memory of 3524 1364 lr190317.exe oneetx.exe PID 1364 wrote to memory of 3524 1364 lr190317.exe oneetx.exe PID 3524 wrote to memory of 4328 3524 oneetx.exe schtasks.exe PID 3524 wrote to memory of 4328 3524 oneetx.exe schtasks.exe PID 3524 wrote to memory of 4328 3524 oneetx.exe schtasks.exe PID 3524 wrote to memory of 392 3524 oneetx.exe rundll32.exe PID 3524 wrote to memory of 392 3524 oneetx.exe rundll32.exe PID 3524 wrote to memory of 392 3524 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c.exe"C:\Users\Admin\AppData\Local\Temp\a9e73ea863c27a584b1001f04e7da1ce9a477726afe10b7fa8a3bcc6a9dd041c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixh1023.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixh1023.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQQ9970.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQQ9970.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it815948.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it815948.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr674112.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr674112.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 13485⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp698465.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp698465.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr190317.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr190317.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 6963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 7803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 7963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 9683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 9763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 8083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 12163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 12083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 13123⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 6964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 8844⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 9364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 10604⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 10524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 10724⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 11124⤵
- Program crash
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 9924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 12604⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 12644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 12604⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 14644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 11364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 16444⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 14724⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 16524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 13643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5092 -ip 50921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1364 -ip 13641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1364 -ip 13641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 1364 -ip 13641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1364 -ip 13641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1364 -ip 13641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1364 -ip 13641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1364 -ip 13641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1364 -ip 13641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1364 -ip 13641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1364 -ip 13641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3524 -ip 35241⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 3202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2616 -ip 26161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3524 -ip 35241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3524 -ip 35241⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 3162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2780 -ip 27801⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr190317.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr190317.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixh1023.exeFilesize
522KB
MD5b792cb29d1d38fa7862d68355d844fea
SHA144b2db2b8812b0a2b8c7135cced35c23bc736813
SHA256ce4db5d3349fa6a790c2360d6e821d60cd8c867fc92d8928b9eddd48a42025ad
SHA51273598fee3cf0a49a57f3dd8ebaa8bd4011a30d14ac5a9680e42971a77109852e8595f1c491e410b28be7006ebb96c4fae54f31c9332bd69c89caf62667f0a655
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixh1023.exeFilesize
522KB
MD5b792cb29d1d38fa7862d68355d844fea
SHA144b2db2b8812b0a2b8c7135cced35c23bc736813
SHA256ce4db5d3349fa6a790c2360d6e821d60cd8c867fc92d8928b9eddd48a42025ad
SHA51273598fee3cf0a49a57f3dd8ebaa8bd4011a30d14ac5a9680e42971a77109852e8595f1c491e410b28be7006ebb96c4fae54f31c9332bd69c89caf62667f0a655
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp698465.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp698465.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQQ9970.exeFilesize
379KB
MD538f732d7c59b152bea4f282e04f40716
SHA1f6023429a3f5f55b51b0cb5394ebeff88e578526
SHA256151dc8eec13a2cdda7e75d5943c9a844641eceb85df2ff11b3afe5eb5cde9273
SHA512e8c8f067b579bacd5fe6366fb47192710a26d0f4a460fd888c818e68977befc1812439e431102f06710fddf16d1353cdfe4bf5d30979860ac2ea3e4cfc049da2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQQ9970.exeFilesize
379KB
MD538f732d7c59b152bea4f282e04f40716
SHA1f6023429a3f5f55b51b0cb5394ebeff88e578526
SHA256151dc8eec13a2cdda7e75d5943c9a844641eceb85df2ff11b3afe5eb5cde9273
SHA512e8c8f067b579bacd5fe6366fb47192710a26d0f4a460fd888c818e68977befc1812439e431102f06710fddf16d1353cdfe4bf5d30979860ac2ea3e4cfc049da2
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it815948.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it815948.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr674112.exeFilesize
292KB
MD54f38eadc172a26e00803f879403decb1
SHA1de8548d5ad9ab2f7140e900764d617d5017a9bb6
SHA25659b29eefe36855764d760e9121926c60758d3a0cfe972972d4d5b6aa833c7388
SHA5121c4ab61bf9bd9bc35a4f317e09a25777bd8058736a97e8baf38d05bfe11ceab4131b853d33b586545f5913712ebebbf18bebd1616c8e5960c3f3dc3a81f05a8b
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr674112.exeFilesize
292KB
MD54f38eadc172a26e00803f879403decb1
SHA1de8548d5ad9ab2f7140e900764d617d5017a9bb6
SHA25659b29eefe36855764d760e9121926c60758d3a0cfe972972d4d5b6aa833c7388
SHA5121c4ab61bf9bd9bc35a4f317e09a25777bd8058736a97e8baf38d05bfe11ceab4131b853d33b586545f5913712ebebbf18bebd1616c8e5960c3f3dc3a81f05a8b
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
memory/1364-1099-0x00000000004B0000-0x00000000004EB000-memory.dmpFilesize
236KB
-
memory/4384-1093-0x00000000049C0000-0x00000000049D0000-memory.dmpFilesize
64KB
-
memory/4384-1092-0x0000000000120000-0x0000000000152000-memory.dmpFilesize
200KB
-
memory/4948-154-0x0000000000F40000-0x0000000000F4A000-memory.dmpFilesize
40KB
-
memory/5092-204-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-1072-0x00000000058E0000-0x00000000059EA000-memory.dmpFilesize
1.0MB
-
memory/5092-182-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-184-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-186-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-188-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-190-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-192-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-194-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-196-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-198-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-200-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-202-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-178-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-206-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-208-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-210-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-212-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-214-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-216-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-218-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-220-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-222-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-224-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-226-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-228-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-1071-0x00000000052C0000-0x00000000058D8000-memory.dmpFilesize
6.1MB
-
memory/5092-180-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-1073-0x00000000059F0000-0x0000000005A02000-memory.dmpFilesize
72KB
-
memory/5092-1074-0x0000000005A10000-0x0000000005A4C000-memory.dmpFilesize
240KB
-
memory/5092-1075-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/5092-1077-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/5092-1078-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/5092-1079-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/5092-1081-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/5092-1080-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/5092-1082-0x00000000066F0000-0x00000000068B2000-memory.dmpFilesize
1.8MB
-
memory/5092-174-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-176-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-172-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-166-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-170-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-168-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-165-0x0000000004BB0000-0x0000000004BEF000-memory.dmpFilesize
252KB
-
memory/5092-162-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/5092-164-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/5092-163-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/5092-161-0x0000000000510000-0x000000000055B000-memory.dmpFilesize
300KB
-
memory/5092-160-0x0000000004D10000-0x00000000052B4000-memory.dmpFilesize
5.6MB
-
memory/5092-1083-0x00000000068D0000-0x0000000006DFC000-memory.dmpFilesize
5.2MB
-
memory/5092-1084-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/5092-1085-0x0000000006F40000-0x0000000006FB6000-memory.dmpFilesize
472KB
-
memory/5092-1086-0x0000000006FD0000-0x0000000007020000-memory.dmpFilesize
320KB